Process: A72 - Security Management |
|
|
Identify security threats, determine risks and vulnerabilities which affect the IT organization or that IT can affect, and recommend mitigating changes based on this analysis. To get more information, select Description (introduction and list of tool mentors), Work Breakdown Structure (workflow diagram and table), Team Allocation (table of roles), or Work Product Usage (table of work products). |
|
Workflow
Work Breakdown
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.
|
|