During risk assessment, which step entails identifying and examining potential system weaknesses to determine their impact?
Threat Identification
Impact Estimation
Vulnerability Analysis

Computer Science Exercises are loading ...