The Risk Management Equation
Loading...

Authors
Subjects
risk
management
IA
matrix
security
encryption
LAN
threats
vulnerabilities
management
IA
matrix
security
encryption
LAN
threats
vulnerabilities
Advisors
Date of Issue
2005-01-10
Date
Publisher
Language
Abstract
The student can drag and drop items into a IA management matrix and receive correct or incorrect feedback.
Type
Interactive Media Element (IME)
Description
drag
Drag-and-Drop Exercise
Interactive Media Element
Drag-and-Drop Exercise
Interactive Media Element
Series/Report No
Department
Organization
Identifiers
NPS Report Number
Sponsors
Funder
Format
Citation
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.