top of page
12643219_5039684.jpg

Blockchain Network Cybersecurity

Design Secure IoT/IT Product

All potential threats need t be identified and rated. 

Methods: attack tree, STRIDE model, etc. 

Outcome of this analysis are requirements. 

Requirements shall provide high level functions. 

  1. Polymer degradation 

  1. Polymer aging prediction 

  1. Polymer durability 

  1. Polymer life prediction 

  1. Polymer performance degradation 

  1. Polymer material aging 

  1. Polymer part life cycle 

  1. Polymer component degradation 

  1. Polymer part aging 

  1. Polymer part life prediction 

Picture23.png
bottom of page