The University of SydneyPage 12How to ensure secure goals?
Assess Risk
Identify vulnerabilitiesand threats
Implement Controls