Drag and drop the security concept on the left onto the example of that concept on the right.
Select and Place:
Threat
|
Vulnerability
|
Risk Assessment
|
Exploit
|
|
network is compromised
|
Threat
|
lack of an access list
|
Vulnerability
|
configuration review
|
Risk Assessment
|
leakage of confidential information
|
Exploit
|
|