Page 180

The University of SydneyPage 31How to ensure secure goals?

Assess Risk

Identify vulnerabilitiesand threats

Implement Controls