Возможные варианты атак
Реализация угрозы «хищение»
[I.A.2]
|
[M1.A.02]
|
[B.II.a.3]
|
[I.A.2]
|
[M1.B.02]
|
[A.IV.b.2]
|
[I.A.2]
|
[M1.B.02]
|
[A.IV.b.3]
|
[I.A.2]
|
[M3.A.09]
|
[B.I.c.3]
|
[I.A.2]
|
[M3.A.09]
|
[B.II.a.2]
|
Реализация угроз «блокирование» и «уничтожение»
[I.A.2]
|
[M3.A.01]
|
[A.IV.b.3]
|
[I.A.2]
|
[M3.A.01]
|
[B.I.c.3]
|
[I.A.2]
|
[M3.A.04]
|
[A.IV.b.2]
|
[I.A.2]
|
[M3.A.08]
|
[B.II.a.2]
|
[I.A.2]
|
[M3.A.04]
|
[B.II.a.2]
|
[I.A.2]
|
[M3.A.05]
|
[B.I.b.1]
|