File:Cyberattack chain.jpg

Original file(2,160 × 1,080 pixels, file size: 394 KB, MIME type: image/jpeg)

Summary

Description
English: See title
Date
Source

Asset Attack Vectors Building Effective Vulnerability Management Strategies to Protect Organizations — Morey J. Haber

Brad Hibbert
Author

Morey J. Haber and

Brad Hibbert

Licensing

Public domain This chart is ineligible for copyright and therefore in the public domain, because it consists entirely of information that is common property and contains no original authorship. For more information, see Commons:Threshold of originality § Charts

العربية | Deutsch | English | español | français | italiano | 日本語 | македонски | română | русский | slovenščina | 中文(简体) | 中文(繁體) | +/−

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current07:14, 1 May 2024Thumbnail for version as of 07:14, 1 May 20242,160 × 1,080 (394 KB)BuidheUploaded a work by Morey J. Haber and Brad Hibbert from Asset Attack Vectors Building Effective Vulnerability Management Strategies to Protect Organizations — Morey J. Haber Brad Hibbert with UploadWizard
The following pages on the English Wikipedia use this file (pages on other projects are not listed):