Talk:DREAD (risk assessment model)

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
WikiProject Computer Security / Computing  (Rated Start-class, Low-importance)
WikiProject iconThis article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Low  This article has been rated as Low-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (marked as Low-importance).
 
Things you can help WikiProject Computer Security with:
Newspaper.svg
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Answer question about Same-origin_policy
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.

Discoverability

"Discoverability - how easy is it to discover the threat?" - Is it really the threat that's hard to discover or is it the vulnerability? 178.15.38.111 (talk) 11:37, 9 May 2016 (UTC)

Original author?

Are the original authors David Leblanc and Michael Howard? As implied here? https://blogs.msdn.microsoft.com/david_leblanc/2007/08/14/dreadful/ DouglasHeld (80.229.146.237 (talk) 10:19, 8 January 2017 (UTC))