diff --git a/_layouts/threatmodel.html b/_layouts/threatmodel.html index e4d901b..e3659d3 100644 --- a/_layouts/threatmodel.html +++ b/_layouts/threatmodel.html @@ -42,7 +42,7 @@
Defense against insiders.
We assume the adversary is an individual or system that already has some level of privilige or trust inside the organization. This could be anything from a disgruntled employee to a compromised work station or server.
+We assume the adversary is an individual or system that already has some level of privilege or trust inside the organization. This could be anything from a disgruntled employee to a compromised work station or server.
Defense against well-funded organizations.
An organized, well-funded group possessing diverse expertise across multiple domains (malware, supply chain, network exploitation, physical access, insider recruitment). Capable of sustained campaigns combining internal and external compromise.
-