
Security Nework
Organizational digital assets are now implemented on a real or virtual platform, and the services associated with them are established on this platform. With a comprehensive and service-oriented perceptions of these digital assets, measures must be taken to eliminate or reduce the risk of these risks by identifying vulnerabilities and discovering weak points.
The following are the steps in the operation:
• The 1st phase - recognition
• The 2nd phase - presentation of the security plan
• The 3rd phase - participation or consultation in the implementation of the security plan
• The 4th phase-security evaluation of the network infrastructure and information systems
• The 5th phase-providing a security service
• The 6th phase-consultation in applying the service
• The 7th phase - auditing or applying security services
• The 8th phase - security management