CreatorTim Ramey
Description
For each military mission that the system supports or business function that it performs, the CyWG analyzes the identified attack surface's likely avenues of cyber-attack and identifies opportunities an attacker may use to exploit the system. The CyWG also looks for relationships between functional T&E and the attack surface and paths.Owning Diagram A2: Phase 2: Characterize Attack Surface
Mission-Based Cyber Risk Assessment (MBCRA)
prioritization of attack surface