The first step is to identify critical system assets — intangible or tangible — that are vulnerable to malicious attacks.
第一步是确定易遭到恶意攻击的关键系统资产——无形的或者有形的。
Many of these assets are tangible, suchas machinery, factories, and offices; others are intangible, such as technicalexpertise, trademarks, and patents.
大部分实物资产是有形的资产,例如机器、厂房和办公室;其他的则是无形资产,例如专业技术知识、商标以及专利。
The first step says you need to identify critical system assets-tangible and intangible-that are most likely vulnerable to malicious attacks.
第一步表示您需要识别(有形或无形的)关键系统资产,这些资产罪可能受到恶意攻击。
应用推荐