Research Article
System Health Monitoring Using a Novel Method: Security Unified Process
| ID | Threat |
| T1 | Cache poisoning attacks | T2 | Data deletion | T3 | SQL injection | T4 | VLAN hopping attacks | T5 | Earthquake | T6 | Data theft | T7 | Directory traversal | T8 | Data discovery | T9 | Physical theft |
|
|