Use of Concept: cyber attack surface analysis report
Creator
Description
Owning Diagram
A0: Assess Cybersecurity Risk
ICOM Details:
Output on Activity
A2 Phase 2: Characterize Attack Surface
.
Input on Activity
A3 Phase 3: Identify Cybersecurity Vulnerabilities
.