Information base security is routinely ignored, as it might advance a striking mission for security activities and organization bunches who need to make certain abundant security. A definitive point of an aggressor focused on your company is to collect admittance to your data sets putting away fundamental business endeavor data. This is consistently cultivated through a product imperfection or by utilizing direct organization access.
Defining and classifying network or system resources
Assigning relative levels of importance to the resources.
Identifying potential threats to each resource.
Defining and implementing ways to minimize the consequences if an attack occurs.
Defining and implementing ways to minimize the consequences if an attack occurs.