This lesson is for subscribers
You've completed the free preview. Subscribe to unlock every lesson in every course.
Develop abuse cases that describe how attackers might exploit functionality to inform security requirements and design decisions.
You've completed the free preview. Subscribe to unlock every lesson in every course.