Vulnerability Assessment & Attack Mitigation Terms
You'll focus on information relating to vulnerability assessments and attack mitigation.
Created Date
03.26.15
Last Updated
03.26.15
Viewed 73 Times
Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!
But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.
Download the Chakalaka mobile app here:
Topics of this game:
-
The process of inventorying items with economic value. (2 words)
-
The process of listing potential threats. (2 words)
-
Involves constructing scenarios to better understand attackers and their methods. (2 words)
-
Provides a visual representation of potential attacks. (2 words)
-
Determines current weaknesses in organizational security. (2 words)
-
Determines damage resulting from a hypothetical attack. (2 words)
-
Expected monetary loss each time a risk occurs. (3 words)
-
Expected monetary loss over a one year period. (3 words)
User comments are currently unavailable. We apologize for the inconvenience and are working to restore this feature as soon as possible.