
Business Analytics 265
mine. I invite you to add or subtract from my lists as you see fit. For, in that way, you
begin to make ATASM your own.
By now, I hope that you are becoming more comfortable with the ATASM process.
Assuming that you no longer need to be reminded of the steps and how each contributes
to the understanding of the whole and to each other—Architecture, Threats, Attack
Surfaces, and Mitigations—I will no longer note the process as we analyze the remain-
ing architectures in the following example assessments. Furthermore, in order to pace
the remaining analyses, I will not list out the attack surfaces that are uncovered after ...