This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Vulnerability Assessment & Attack Mitigation Terms

| See more in Information Technology

You'll focus on information relating to vulnerability assessments and attack mitigation.

TBaeten
By
Created Date 03.26.15
Last Updated 03.26.15
Viewed 72 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Would you like to build your own game?

It's easy!

Go to the GameBuilder and get started!

Topics of this game:
  • The process of inventorying items with economic value. (2 words)
  • The process of listing potential threats. (2 words)
  • Involves constructing scenarios to better understand attackers and their methods. (2 words)
  • Provides a visual representation of potential attacks. (2 words)
  • Determines current weaknesses in organizational security. (2 words)
  • Determines damage resulting from a hypothetical attack. (2 words)
  • Expected monetary loss each time a risk occurs. (3 words)
  • Expected monetary loss over a one year period. (3 words)