3. Describe the threat intelligence lifecycle (AC 1.3)
Previous2. Explain the following terms in relation to cyber security (AC 1.2)Next4. Describe how to find out about emerging attack techniques and how to recognise them (AC 1.4)
Last updated
Last updated