header bg

Question:

Within their network and security systems, what does an organization do to identify areas of vulnerability?

A Risk assessment
Explaination