IT Security & Policy Office

Observation number and brief description of observation (e.g., Observation 1: User system passwords can be guessed or cracked) A discussion of the threat-source and vulnerability pair. Identification of … ................
................