November 2018
Intermediate to advanced
382 pages
11h 20m
English
This step provides a solid foundation for understanding not only the expected functionality of the IoT system, but also the potential misuse of the system. There are three sub-steps to this part of the threat modeling process:
Documentation of system functionality is best accomplished by creating a set of use cases such as those that follow:
|
Use case 1: Customer pays ... |