- tagging devices or intangible asset (database) with physical label (barcode) or Radio Frequency Asset
- to avoid competitors take an advantages when asset lost
Vulnerability Assessment :
- search for a weakness in order to apply a patch or fix to prevent a compromise
- ways: eg- installing vendor patches and implementing or virus scanning software.
threat identification :
- listing all possible threat that can be occur.
No comments:
Post a Comment