Web application security - the fast guide 1.1 | Page 46

Chapter 3 Vulnerabilities and threat models STRIDE IIMF DREAD CVSS CIA