February 2018
Intermediate to advanced
396 pages
9h 38m
English
During this type of analysis, all the threats based on the location metric are mapped. We can divide threats into two categories—internal and external threats. Employees of the organizations, including the upper management, are also part of this classification because humans are the weakest layer when it comes to information security.
Read now
Unlock full access