The Risk Management Equation
Loading...
Authors
Advisors
Second Readers
Subjects
risk
management
IA
matrix
security
encryption
LAN
threats
vulnerabilities
management
IA
matrix
security
encryption
LAN
threats
vulnerabilities
Date of Issue
2005-01-10
Date
Publisher
Language
Abstract
The student can drag and drop items into a IA management matrix and receive correct or incorrect feedback.
Type
Interactive Media Element (IME)
Description
drag
Drag-and-Drop Exercise
Interactive Media Element
Drag-and-Drop Exercise
Interactive Media Element
Series/Report No
Department
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
