. What factors have brought an increased emphasis on network security?
. Briefly outline the steps required to complete a risk assessment.
. Name and describe the main impact areas. Who should be responsible for assessing what is meant by low/medium/high impact for each of the impact areas?
Explain your answer.