mal-lang / coreLang

A probabilistic attack simulation language for the (abstract) IT domain
https://mal-lang.org/coreLang/
Other
11 stars 13 forks source link

Document which attack steps should be used as entry points #53

Open andrewbwm opened 3 years ago

andrewbwm commented 3 years ago

Document which attack steps should be used as entry points for the attacker so that modellers know which attack steps they should select when designing general scenarios.

This is something that would be nice to have in the documentation for added clarity, but is in no way crucial.

andrewbwm commented 2 years ago

Do this as part of the code review(#77) since we need to check and see if all of the entry points are available to the modeller.