1.

Explain The Process Of Threat Identification?

Answer»

Threat Identification

Each of the threats identified so far has the potential to ATTACK any of the assets protected

This will quickly BECOME more COMPLEX and OVERWHELM the ability to plan

To make this part of the PROCESS manageable, each step in the threat identification and vulnerability identification process is managed separately, and then coordinated at the end of the process.

Threat Identification

Each of the threats identified so far has the potential to attack any of the assets protected

This will quickly become more complex and overwhelm the ability to plan

To make this part of the process manageable, each step in the threat identification and vulnerability identification process is managed separately, and then coordinated at the end of the process.



Discussion

No Comment Found