pose |
|
Threat Agent |
Threat |
|
|
Vulnerability |
IT Security Risk |
|
|
Asset Value |
IT Security Risk |
exploit |
|
Threat |
Vulnerability |
|
|
Threat |
IT Security Risk |
|
|
Recommended Security Control (SA&A process) |
Operational Security Control |
|
|
Recommended Security Control (SA&A process) |
Technical Security Control |
|
|
Recommended Security Control (SA&A process) |
Management Security Controls |
|
|
Recommended Security Control (SA&A process) |
IT Security Risk |
has |
|
Asset |
Vulnerability |
has |
|
Asset |
Asset Value |