The Circle - Illustrates what can happen if an attacker gains access to private and confidential information, Confidentiality - Illustrates the kind of information disclosure that might happen if an attacker succeeds in exploiting a vulnerability, Integrity - Illustrates the kind of information modification that might happen if an attacker succeeds in exploiting a vulnerability, Attack complexity - Specifies how easy or difficult it is to exploit the discovered vulnerability, Availability - Illustrates the kind of disruption that might happen if an attacker succeeds in exploiting a vulnerability, Attack vector - Shows how vulnerability may be exploited and follows a certain set of measures,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?