First page Back Continue Last page Summary Graphic
Operations Security
Identification of assets requiring protection
Establishment of value of those assets
Identification of threats associated with each asset
Identification of the vulnerability of the system to such threats