Guiding Questions. What types of attack can a threat initiate? Where are the interfaces between the target system and cyberspace, and how can attacks be launched through these interfaces?
Appears in 2 contracts
Sources: Grant Agreement, Grant Agreement