Appendix G: Threat Validation and Prioritization ================================================ This appendix presents the threat validations and ranked threats for the complete example. The PANOPTIC-LINDDUN mapping was employed as part of the validation process to identify LINDDUN threats that might be relevant to specific PANOPTIC attacks. After confirming that these associations could potentially compromise one of the NIST privacy engineering objectives, the threats were assigned values for attack feasibility and difficulty and ranked from high to low priority. PANOPTIC – LINDDUN Mapping -------------------------- .. image:: media/Appendix-Figure19.png :width: 48% :alt: PANOPTIC mappings .. image:: media/Appendix-Figure19b.png :width: 48% :alt: LINDUNN mappings Threat Validations and Ranking Attributes ----------------------------------------- .. image:: media/Appendix-Figure20.png :width: 98% :alt: Validations of threats and rankings Ranked Threats -------------- .. image:: media/Appendix-Figure24.png :width: 98% :alt: Table of ranked threats given scenario, threat, feasibility, and difficulty