Deeds101 / CYBR8420-project

3 stars 5 forks source link

Use/Misuse Case 4 (Billing) #14

Closed DoomDragoon closed 9 months ago

Cojajomaco commented 10 months ago

image

Reopened until reviewed

DoomDragoon commented 10 months ago

One thing I would add is a large box showing this all takes place inside the system, and weather or not it might have to interact with various different ERP systems of clients. Otherwise this looks pretty damn good for a first draft

Atmcalpine commented 9 months ago

If possible, I would try to add some additional levels of exploitations that may be used to get past the controls referenced and any additional system controls that are available to address those vulnerabilities.

Cojajomaco commented 9 months ago

If possible, I would try to add some additional levels of exploitations that may be used to get past the controls referenced and any additional system controls that are available to address those vulnerabilities.

Thanks for the feedback, I added an additional level and protections to the diagram.

image