Читать книгу Risk Assessment - Marvin Rausand - Страница 122

2.6.4.1 An Illustration

Оглавление

Figure 2.7 shows that a threat agent may use a threat to launch an attack intended to exploit a vulnerability in the system. If the vulnerability is “penetrated” a hazardous event will occur. The threat actor may in some cases get information about vulnerabilities in the system and choose the type of threat that most likely will make the attack successful (from her point of view).

Figure 2.7 The concepts of threat, threat actor, and vulnerability.

Risk Assessment

Подняться наверх