Authentication, Vulnerability assessment, Cryptography, Asset classification, and Threat analysis
Classified assets. Analyzed an attack surface to found risks and vulnerabilities. Identified threats, such as social engineering, malware and web-based exploits. Summarized the threat modeling process