Threats to IT Systems

--

I was conceptualizing common threats, threat vectors and assets in an enterprise a potential hacker is after. This was part of a much larger deck I had intended to present but I have no recollection of where the presentation is — not my local drive, not my mailbox, not on shared drivers.

This is the only image I have and sometimes best left for others to take the concept forward. So here it is — use it as you please. Please retain my name — some day when I am famous, you may want to claim that you know me :)

--

--

Kiran Addepalli
Kiran Addepalli

Written by Kiran Addepalli

Executive Leader| Data and Identity Champion| Innovation and Product Builder

No responses yet