Use of Concept: catalog of cybersecurity requirements
Creator
Description
Owning Diagram
A0: Assess Cybersecurity Risk
ICOM Details:
Output on Activity
A1 Phase 1: Understand Cyber Security Requirements
.
Control on Activity
A2 Phase 2: Characterize Attack Surface
.
Control on Activity
A6 Phase 6: Assess Adversary Impact on Missions
.