- Open ports on a firewall
- Not upgrading to new OS version
- Not applying a software patch
- Identify and prioritizing assets
- Identify vulnerabilities
- Identify threat and probabilities of it occurring
- Identify countermeasures
- Develop a cost benefit analysis
- Develop security policies and procedures
No comments:
Post a Comment