![]() |
|
| Threat Analysis |
A-B-C- D-E-F- G-H-I- J-K-L- M-N-O- P-Q-R- S-T-U- V-W-X- Y-Z
Identification
Definitions/Uses| 1997 | |
|---|---|
| Reference | /VM 1997/ V-Model 97, Lifecycle Process Model. |
| Definition/ Use |
The threats relevant for the system must be determined in the threat analysis by taking into consideration the (planned) application environment and which must be evaluated with regard to the meaning of the threats (i. e. type of damages to be expected). |
Other Languages
GDPA Online
Last Updated 01.Jan.2002
Updated by Webmaster
Last Revised 01.Jan.2002
Revised by Webmaster
![]() |