1 |
Credentialed analysisIn vulnerability analysis, passive monitoring approaches in which passwords or other access credentials are required. Scope Notes: Usually involves accessing a system data object
|
<< Countermeasure | Criteria >> |