Discussion Post
1) What does an assessor need to understand before she or he can perform an assessment?
2) How active is each threat agent? How might a successful attack serve a particular threat agent's goals?
Textbook: Schoenfield, Brook S.E. - Securing Systems: Applied Security Architecture and Threat Models, CRC Press, 2014 ISBN: 978-1-4822-3397-1
The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.