What advantage does Process Flow Diagram (PFD) threat modeling have over Data Flow Diagrams (DFD)?
PFDs require more security expertise
PFDs model from the attacker's perspective, focusing on user interactions rather than just data movement
PFDs only work for web applications
PFDs ignore trust boundaries
This question is part of this quiz :
Threat Modelling