Type: Posts; User: souleman; Keyword(s):
Don't they skip step 4a and 4b also? They kinda do a 4a1/2 when a problem is found, pretend to fix it and get back to 3 asap....
Well, I just liked the little pictures... Anyway, this gives a good, brief overview of the security assessment life cycle, and it has a funny little hacker dude playing witha lock. What could be...