Info Security & Risk Mgmt
June 14th, 2022
Provide a description of a project and identify the threat/vulnerability pairs with the associated threat action. You are allowed to make assumptions. For example, the project may be to protect the communications network between the University’s Main campus and its satellite campuses.