Рет қаралды 59
Business.gov.nl
Make an inventory of your business’ ICT components and vulnerabilities, and make a risk analysis. With each risk you look at availability, integrity, and confidentiality.