A man-made threat achieved through exploitation of the information and communications technology (ICT) system’s supply chain, including acquisition processes.
A man-made threat achieved through exploitation of the information and communications technology (ICT) system’s supply chain, including acquisition processes.