stariou7032 stariou7032
  • 05-12-2017
  • Computers and Technology
contestada

At what point in a vulnerability assessment would an attack tree be utilized?

Respuesta :

CrypticGeek
CrypticGeek CrypticGeek
  • 15-12-2017
During threat evaluation - A vulnerability assessment is done to gauge the impact expected from a successful attack and also how vulnerable the software is to an attack. An attack tree, when created during the threat evaluation phase allows one to analyze and describe possible attacks that can be realized on the system.
Answer Link

Otras preguntas

The invention and development of television was accomplished __________. mostly through the efforts of a single inventor through the work of many competing in
Which is a true statement about federal judges? They are appointed by the Senate. They serve five-year terms. They are approved by the Supreme Court. They serve
p - 4 = -9 + p. Please help.
When do you need to regroup, explain?
In Emily Dickinson's poetry, which help readers know to pause when reading and thereby help give the poems their rhythm? A. the dashes Dickinson uses B.
The green residue you see in an aquarium is called _____. spirogyra cladophora nostoc volvox
Economists use graphs to analyze the choices and trade-offs that people make in a society. Please select the best answer from the choices provided T F
Definition of challenges
Which of the following is not normally affected by long term alcohol use? a. Cirrhosis of the liver b. Reduced inhibitions c. Heart damage
How did India benefit from Western technology?