MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 8 R ISK M ANAGEMENT : I DENTIFYING AND A SSESSING R ISK Once we know our weaknesses, they cease.
ITC358 ICT Management and Information Security