1)As noted by Fennelly (2017), there are different stages to identifying vulnerabilities of a physical protection system (PPS). The vulnerability assessment (VA) process can be segmented into the following three phases:
Select 1 of the phases and discuss the details of that phase. Also comment on why you selected that phase.
2)Discuss the textbook's recommendations for improving business-IT communication. Provide examples from your own experience to support your ideas.
Forum rules: