November 22, 2021
Map network and its connections to show the dependencies between applications, data and network layers to highlight potential vulnerabilities
Make computing resources physically unavailable to unauthorized users