This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Vulnerability Assessment & Attack Mitigation Terms

You'll focus on information relating to vulnerability assessments and attack mitigation.

TBaeten
By
Created Date 03.26.15
Last Updated 03.26.15
Viewed 73 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit
151

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • The process of inventorying items with economic value. (2 words)
  • The process of listing potential threats. (2 words)
  • Involves constructing scenarios to better understand attackers and their methods. (2 words)
  • Provides a visual representation of potential attacks. (2 words)
  • Determines current weaknesses in organizational security. (2 words)
  • Determines damage resulting from a hypothetical attack. (2 words)
  • Expected monetary loss each time a risk occurs. (3 words)
  • Expected monetary loss over a one year period. (3 words)

User comments are currently unavailable. We apologize for the inconvenience and are working to restore this feature as soon as possible.