Project 2: Risk Assessment Start Here Organizations must stay up-to-date on their vulnerabilities and protection measures. Once vulnerabilities have been evaluated, the organization uses this informat
Vulnerable Assets Template
In this step, list all the vulnerable assets for the enterprise.
Note that assets should simply be identified at this stage. Items do not need to be prioritized or assigned values. Pay particular attention to application software in both the acquisition and implementation phases.
This initial list should be as comprehensive as possible, even if you don’t keep every item in your final working list of resources to be protected.
Vulnerable Assets |