This is a site designed to make it easier to
take the core of large published reports and
allow anyone to comment on them.
A.2.72 The risk assessment method that is adopted here defines information
assets in terms of the value of their confidentiality, integrity and availability.
Email this to a friend.
Previous item —
We only allow the following html tags em strong blockquote p br. After posting, there may be a short delay before your comment appears on the site