This is a site designed to make it easier to
take the core of large published reports and
allow anyone to comment on them.
A.2.12 Within the risk assessment method that is adopted here, attack groups
are defined in terms of the information assets that they are authorised to access,
their capability and their motivation.
Email this to a friend.
Previous item —
We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site