Use of Concept: threat intelligence estimate
Creator
Description
Owning Diagram
A22: Analyze the Attack Surface
ICOM Details:
Tunneled Concept in Diagram.
Control on Activity
A221 Characterize the Cyber Threat
.