Attack vector

Comments Off on Attack vector 12

This represents the combination of the method and access point that an attacker could use to attack the system.

© 2019 CISOHandbook.com - Privacy Policy

Back to Top