Evaluation of Threat Models
Evaluation of Threat Models
Evaluation of Threat Models
ISSN No:-2456-2165
Likability:
An unauthorized user can link two items of interest even
if they do not know the authorized user’s identity.
Identity:
Through an item of interest, an unauthorized user can
identify a particular data subject from a set.
Non-repudiation:
The data subject cannot deny a particular claim.
Detectability:
An unauthorized user can detect data subject and
distinguish whether an item of interest about that subject
exists.
Disclosure of information:
An unauthorized user can learn the contents of an it of
interest.
Fig 2: Pasta threat modelling stages
Unawareness:
The output of each stage acts as the input of the next The authorized user is unaware that their personal data
stage. is being collected, processed, stored or shared.