Threat model
a
Attack
a
Vector
a
Authentication
a
Brute force attack
a
Probabilistic
a
2FA
a
Access control and ACLs
a
Read permissions
a
Write permissions
a
Execute permissions
a
Malware
a
Security kernel
a
Virtual machines
a
Potential unwanted programs
a