From 79965662ca9c649e9a07cd41834cc1e084a9d095 Mon Sep 17 00:00:00 2001 From: Anton Livaja Date: Fri, 2 May 2025 11:58:12 -0700 Subject: [PATCH] fix: spelling errors --- _layouts/threatmodel.html | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/_layouts/threatmodel.html b/_layouts/threatmodel.html index e4d901b..e3659d3 100644 --- a/_layouts/threatmodel.html +++ b/_layouts/threatmodel.html @@ -42,7 +42,7 @@

Level 2

Defense against insiders.

Adversary
-

We assume the adversary is an individual or system that already has some level of privilige or trust inside the organization. This could be anything from a disgruntled employee to a compromised work station or server.

+

We assume the adversary is an individual or system that already has some level of privilege or trust inside the organization. This could be anything from a disgruntled employee to a compromised work station or server.

Capabilities
@@ -63,12 +63,12 @@

Defense against well-funded organizations.

Adversary

An organized, well-funded group possessing diverse expertise across multiple domains (malware, supply chain, network exploitation, physical access, insider recruitment). Capable of sustained campaigns combining internal and external compromise.

-
Capabilies
+
Capabilities