This document implies : - a list of vulnerabilities due to IN architecture to the use of SCF-SDF and SCF-SCF interfaces - a desecription of threats (intentioanl or accidental) and their effect - a determination of their likelihood based on the motivation of the attacker - a list of requirements which cover the main scenarii
Product Details
Edition: 1.1.1 Published: 07/01/1998 Number of Pages: 21 File Size: 1 file , 67 KB