1) Describe the Octave method.
2) Explain:
a) Build Asset Based Threat Profile
b) Identifying Infrastructure vulnerabilities
c) Developing Security Strategy and plans.
3) Describe a case study from your search where octave was used to make decisions. How did those decisions impact the Organizations IT Assets.