The process of identifying and analyzing potential threats and vulnerabilities to information systems is known as:
Risk assessment
Security audit
Compliance assessment
Control assessment

Information Security Exercises are loading ...