Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.
Submit