Description
A person or resource of a hardware, software or network type simulating an intense demand on resources by setting up continuous bombardment.
Owning organization
Creator
License
Creative Commons Zero v1.0 Universal
Related objects
- 7f9eb70a-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9eb72f-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9eb698-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9eb6be-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9eb6e4-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ec581-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ec5ca-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ec5f0-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ec616-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ec63d-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ed560-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ed587-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ef367-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ed5ab-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9eec2a-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ed5d0-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9eee63-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ed5f2-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9ee017-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9efc89-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f18ce-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f27d9-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f089d-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f08c7-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f2163-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f08f2-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f54c3-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f376d-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f6025-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f7a26-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f60c8-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f79f7-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f78c9-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f6298-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f7460-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f7655-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f93d7-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f9fc7-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9faeba-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f8e4c-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f9ffc-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f863b-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f8af0-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f9393-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f9f81-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9fa188-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f8623-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f9829-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f9a81-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f9faf-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9facff-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9faeda-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f860c-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9f9f98-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9fa526-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9fad22-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9fbfb9-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9fbfa2-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9fbf59-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9fbf89-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
- 7f9fbf42-4f02-11e9-b3ea-0800277f0571 (schema: Risks)
Definition of the object
{
"a": 1,
"c": 0,
"code": "MDA16",
"description": "A person or resource of a hardware, software or network type simulating an intense demand on resources by setting up continuous bombardment.",
"i": 0,
"label": "Saturation of the information system",
"language": "EN",
"theme": "Technical failures",
"uuid": "b402d5df-4576-11e9-9173-0800277f0571"
}