文档介绍:Module 1: Explaining
Security Threats and
Vulnerabilities
Contents
Overview 1
Lesson: Explaining How Assets Are Attacked 2
Assessment 12
Lesson: Communicating the Impact of Risks 13
Assessment 20
Lab A: Explaining Security Threats and
Vulnerabilities 21
Information in this document, including URL and other Web site references, is subject to
change without notice. Unless otherwise noted, the panies, organizations, products,
domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious,
and no association with any pany, organization, product, domain name, e-mail address,
logo, person, place or event is intended or should be inferred. Complying with all applicable
copyright laws is the responsibility of the user. Without limiting the rights under copyright, no
part of this document may be reproduced, stored in or introduced into a retrieval system, or
transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in any
written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
2002 Microsoft Corporation. All rights reserved.
Microsoft, MS-DOS, Windows, Windows NT, <plus other relevant MS trademarks, listed
alphabetically. The publications specialist replaces this example list with the list of trademarks
provided by the copy editor. Microsoft, MS-DOS, Windows, and Windows NT are listed first,
followed by all other Microsoft trademarks listed in alphabetical order.> are either registered
trademarks or trademarks of Microsoft Corporation in the Un