1) Describe the Octave method.
2) Explain: a) Build Asset Based Threat Profile b) Identifying Infrastructure vulnerabilities c) Developing Security Strategy and plans.
3) Describe a case study from your search where octave was used to make decisions. How did those decisions impact the Organizations IT Assets.