Download now Free registration required
Enterprise security has grown in complexity over the last decade. The information technology department must be part of this determination so that strategies for network vulnerability mitigation can begin to emerge. Once there is a clear image of what it is that needs the most protection, then costing analysis can start. That is why identifying all possible vulnerabilities is critical so that if cost is an issue the users' can start prioritizing those assets in terms of what risks can the business afford versus what policies must be in place to avoid the exposure of the asset to the risk, by curbing employees' current behavior.
- Format: PDF
- Size: 146.79 KB