Skip to content

Document which attack steps should be used as entry points #53

Open
@andrewbwm

Description

@andrewbwm

Document which attack steps should be used as entry points for the attacker so that modellers know which attack steps they should select when designing general scenarios.

This is something that would be nice to have in the documentation for added clarity, but is in no way crucial.

Metadata

Metadata

Assignees

Labels

documentationImprovements or additions to documentation

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions