This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Vulnerability Assessment & Attack Mitigation Terms

| See more in Information Technology

You'll focus on information relating to vulnerability assessments and attack mitigation.

TBaeten
By
Created Date 03.26.15
Last Updated 03.26.15
Viewed 73 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • The process of inventorying items with economic value. (2 words)
  • The process of listing potential threats. (2 words)
  • Involves constructing scenarios to better understand attackers and their methods. (2 words)
  • Provides a visual representation of potential attacks. (2 words)
  • Determines current weaknesses in organizational security. (2 words)
  • Determines damage resulting from a hypothetical attack. (2 words)
  • Expected monetary loss each time a risk occurs. (3 words)
  • Expected monetary loss over a one year period. (3 words)