1 / 1100%
Step 1: Identify security objectives - My first task is to catalogue my assets, including
building infrastructure, network components, possible threat actors.
Step 2: Identify assets and external dependencies. Checking what is considered
valuable and where these are located.
Students also viewed