Information base security is routinely ignored, as it might advance a striking mission for security activities and organization bunches who need to make certain abundant security. A definitive point of an aggressor focused on your company is to collect admittance to your data sets putting away fundamental business endeavor data. This is consistently cultivated through a product imperfection or by utilizing direct organization access.
1. Defining and classifying network or system resources
2. Assigning relative levels of importance to the resources
3. Identifying potential threats to each resource
4. Developing a strategy to deal with the most serious potential problems first
5. Defining and implementing ways to minimize the consequences if an attack occurs