Page 161

The University of SydneyPage 12How to ensure secure goals?

Assess Risk

Identify vulnerabilitiesand threats

Implement Controls