Respuesta :

Once you identify likely threat/vulnerability pairs, you can implement mitigation techniques.

Mitigation techniques are technologies used in radio communications to minimize the interference from a radio transmitter to other users.
Hence,
The current configuration of the system should be ensured when defining the system for the risk assessment.