Use of Concept: key cyber terrain
Creator
Description
Owning Diagram
A0: Assess Cybersecurity Risk
ICOM Details:
Output on Activity
A2 Phase 2: Characterize Attack Surface
.
Control on Activity
A4 Phase 4: Test & Evaluate Adversarial Impact on Critical Functions
.