Briefly list the things which happen during the planning and preparation phase of the security assessment methodology.

What will be an ideal response?

During the planning and preparation phase of the security assessment methodology, the assessor defines a scope, gathers information about potential weak areas of the network, identifies potential attacks, classifies and prioritizes assets, specifies objectives and goals, and lists resources required.

Computer Science & Information Technology

You might also like to view...

Characteristics of a field that control how the field displays and how data is entered are:

a. data sources b. data forms c. field properties

Computer Science & Information Technology

A typical storyboard includes sections for all of the following EXCEPT:

A) the title slide. B) to introduce the topic. C) add animations. D) develop the topics.

Computer Science & Information Technology