68.0k views
5 votes
What can you control about threat/vulnerability pairs?

1 Answer

1 vote
Once you identify likely threat/vulnerability pairs, you can implement mitigation techniques.

Mitigation techniques are technologies used in radio communications to minimize the interference from a radio transmitter to other users.
Hence,
The current configuration of the system should be ensured when defining the system for the risk assessment.
User StackOp
by
8.3k points

No related questions found