7f9fbf59-4f02-11e9-b3ea-0800277f0571


Description
Asset: Business application. Threat: Saturation of the information system. Vulnerability: Requirements defined for a project without taking into account special situations that put the system under limit conditions.
Owning organization
Validating JSON schema
Risks (provided by MONARC)
Creator
License
Creative Commons Zero v1.0 Universal
SHA 256 footprint
ea32a213959b4c913f863994aa3139bd1af1dbab6610fbf144dd356a4db143fd

Definition of the object
{
    "asset": "d2023cb8-44d1-11e9-a78c-0800277f0571",
    "threat": "b402d5df-4576-11e9-9173-0800277f0571",
    "uuid": "7f9fbf59-4f02-11e9-b3ea-0800277f0571",
    "version": 1,
    "vulnerability": "69fc07bc-4591-11e9-9173-0800277f0571"
}