The relation between vulnerabilities, impacts, threats, and risks
Discuss the relation between vulnerabilities, impacts, threats, and risks. Give an example.
What is the first question that should be asked when protecting assets from a cyberattack?
Discuss one of the Threat Modeling Methodologies discussed in this week’s reading.
Give a question/comment on the CySA+ certification and its validity in the industry.