200
A tool that coordinates the assets that were taken, individuals who had theft opportunities, investigation methods, concealment and conversion possibilities, symptoms observed, pressures, rationalizations, and key controls that had to be compromised.
What is a vulnerability chart?