Use of Concept: cyber security scenarios
Creator
Description
Owning Diagram
A2: Phase 2: Characterize Attack Surface
ICOM Details:
Output on Activity
A23 Document Results and Update Test Planning and Artifacts
.
Input on Activity
A24 Prepare for Phase 3 and Phase 4 Cybersecurity DT&E Events
.