Register now or log in to join your professional community.
Identify the assets which must be secured
Identify the anticipated threats to those assets
Define alternative security systems to protect against anticiapted threats
Decide on the systems to be used and implement them
Monitor the results and adjust accordingly