I was conceptualizing common threats, threat vectors and assets in an enterprise a potential hacker is after. This was part of a much larger deck I had intended to present but I have no recollection of where the presentation is — not my local drive, not my mailbox, not on shared drivers.

This is the only image I have and sometimes best left for others to take the concept forward. So here it is — use it as you please. Please retain my name — some day when I am famous, you may want to claim that you know me :)

Kiran Addepalli

Executive Leader * Data and Identity Champion * Innovation and Product Builder * Blockchain Enthusiatic

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store