Attack vector

Comments Off on Attack vector 11

This represents the combination of the method and access point that an attacker could use to attack the system.

© 2018 CISOHandbook.com - Privacy Policy

Back to Top