blogs.itemis.com/en/a-tool-based-security-analysis-part-2-damage-classes-and-potentials
Preview meta tags from the blogs.itemis.com website.
Linked Hostnames
8- 49 links towww.itemis.com
- 20 links toblogs.itemis.com
- 2 links towww.linkedin.com
- 2 links towww.youtube.com
- 1 link toinfo.itemis.com
- 1 link tolegal.itemis.com
- 1 link towww.facebook.com
- 1 link towww.instagram.com
Thumbnail

Search Engine Appearance
https://blogs.itemis.com/en/a-tool-based-security-analysis-part-2-damage-classes-and-potentials
A Tool-Based Security Analysis – Part 2: Damage Classes And Potentials
In part 2 of our series on tool-based security analysis we model damage classes and damage potential in order to properly describe security goals.
Bing
A Tool-Based Security Analysis – Part 2: Damage Classes And Potentials
https://blogs.itemis.com/en/a-tool-based-security-analysis-part-2-damage-classes-and-potentials
In part 2 of our series on tool-based security analysis we model damage classes and damage potential in order to properly describe security goals.
DuckDuckGo
A Tool-Based Security Analysis – Part 2: Damage Classes And Potentials
In part 2 of our series on tool-based security analysis we model damage classes and damage potential in order to properly describe security goals.
General Meta Tags
8- titleA Tool-Based Security Analysis – Part 2: Damage Classes And Potentials
- charsetutf-8
- descriptionIn part 2 of our series on tool-based security analysis we model damage classes and damage potential in order to properly describe security goals.
- viewportwidth=device-width, initial-scale=1
- google-site-verificationtB9Zv3dGeLlBJ2fq4geGaFunIeEEGpZLTjiYJhSCM-0
Open Graph Meta Tags
8- og:descriptionIn part 2 of our series on tool-based security analysis we model damage classes and damage potential in order to properly describe security goals.
- og:titleA Tool-Based Security Analysis – Part 2: Damage Classes And Potentials
- og:imagehttps://blogs.itemis.com/hubfs/Fotolia_191072950_M.jpg
- og:image:width2016
- og:image:height942
Twitter Meta Tags
7- twitter:descriptionIn part 2 of our series on tool-based security analysis we model damage classes and damage potential in order to properly describe security goals.
- twitter:titleA Tool-Based Security Analysis – Part 2: Damage Classes And Potentials
- twitter:imagehttps://blogs.itemis.com/hubfs/Fotolia_191072950_M.jpg
- twitter:image:altFotolia_191072950_M
- twitter:cardsummary_large_image
Link Tags
15- alternatehttps://blogs.itemis.com/en/rss.xml
- amphtmlhttps://blogs.itemis.com/en/a-tool-based-security-analysis-part-2-damage-classes-and-potentials?hs_amp=true
- canonicalhttps://blogs.itemis.com/en/a-tool-based-security-analysis-part-2-damage-classes-and-potentials
- preload//7052064.fs1.hubspotusercontent-na1.net/hubfs/7052064/hub_generated/template_assets/DEFAULT_ASSET/1753799526715/template_layout.min.css
- preloadhttps://blogs.itemis.com/hs-fs/hubfs/hub_generated/template_assets/1/21173126636/1751523753618/template_main.min.css
Emails
2Links
77- https://blogs.itemis.com/en
- https://blogs.itemis.com/en/?hsLang=en
- https://blogs.itemis.com/en/a-tool-based-security-analysis-part-1-required-attack-potential?hsLang=en
- https://blogs.itemis.com/en/about
- https://blogs.itemis.com/en/author/andreas-graf