What is the aim of threat analysis?

What will be an ideal response?

The aim of a threat analysis is to characterize the specific harm or disruption that a given event will cause and then evaluate the ability of the associated procedure to protect against that harm.

Computer Science & Information Technology

You might also like to view...

Which of the following is another name for a video accelerator?

A) Video processor B) VRAM C) Video ROM shadowing D) AGP

Computer Science & Information Technology

The ____ feature is used to set text in italics.

A. Layout B. Style C. Format D. Italics and Bold

Computer Science & Information Technology