To help [with threat modeling], I invented something called an … system. … They allow you to make calculations about security … [and] compare the … [p. 320] OR nodes are alternatives, the four different … goal. To eavesdrop on someone saying the safe … … Once you have it completed, you can assign … to the various leaf nodes. … [p. 323] In any real attack tree, nodes will … can be combined to learn more about a … [p. 324] Figure 21.7 is an attack tree for … it's easier to write it in an outline …
Google-1
Google-2
Copyright clearance needed for quotation.