taichi
Member
Joined: Apr 19, 2020
Last seen: Jan 22, 2023
Last seen: Jan 22, 2023
Follow
4 years ago
Replies: 2
Views: 49557
4 years ago
Forum
Replies: 0
Views: 8247
Forum
Replies: 0
Views: 5454
Forum
Replies: 0
Views: 4288
RE: The NIST Model for Vulnerability Management
As described by NIST, vulnerability scanning is a technique used to identify hosts/host attributes and associated vulnerabilities. (Source) NIST sugge...
4 years ago
Forum
RE: Relation between Vulnerability, Threat and Risk
Risk = Asset x Vulnerability x Threat x Possibility
4 years ago
Forum
RE: What is Jira
Issues A Jira 'issue' refers to a single work item of any type or size that is tracked from creation to completion. For example, an issue could be a ...
4 years ago
Forum
4 years ago
Replies: 0
Views: 8262
RE: Threat Modeling: 12 Available Methods
What Are Some Modeling Methods? • Whiteboard diagrams • Brainstorming • Structured (“formal”) diagrams – Data flow diagrams – Swim lanes – State machi...
4 years ago
4 years ago
Replies: 1
Views: 7790
4 years ago
Replies: 0
Views: 8586
Replies: 0
Views: 6547