Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.
◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。