The University of SydneyPage 31How to ensure secure goals?
Assess Risk
Identify vulnerabilitiesand threats
Implement Controls