answersLogoWhite

0

after the assets have been inventoried and the threats have been determined, the next natural question is what our current weaknesses that might expose the assets to these threats?

User Avatar

Wiki User

12y ago

What else can I help you with?