+1 (845) 317-8489 [email protected]
  1. Identify threats to the seven domains of IT within the organization.
  2. Identify vulnerabilities in the seven domains of IT within the organization.
  3. Identify threat/vulnerability pairs to determine threat actions that could pose risks to the organization.
  4. Estimate the likelihood of each threat action identified (i.e., high, medium, low).
  5. Prepare a brief report or presentation of your findings for IT management to review.