110 likes | 227 Vues
Presented to: Energy Innovations Laboratory. Information Security & Data Protection. Team-b Consultants SEC/332 May 5, 2014 Terence hunt, mccm ,. Overview. Title Topic 1. Topic 1. Title Topic 2. Topic 2. Title Topic 3. Topic 3. Conclusion. Questions. Reference.
E N D
Presented to:Energy Innovations Laboratory Information Security & Data Protection Team-b Consultants SEC/332 May 5, 2014 Terence hunt, mccm,
Reference P. J. Ortmeier, P. (2013). Introduction to Security: Operations and Management, (4th ed.). (E. Krassow, Ed.) Upper Saddle River, NJ, United States of America: Prentice Hall. Retrieved March 30, 2014 Vellani, K. (2010, September 10). Vulnerability and Risk Assessment in the Environment of Care. Retrieved April 29, 2014, from http://www.threatanalysis.com/blog/?p=36