It provides opportunity to detect the security breaches that attackers may use, principles that violate the configuration and malwares. It helps to make IT infrastructure guaranteed permanently and the internal affairs and external arrangements be complied.

13-Güvenlik Zafiyeti Analizi ve Yönetimi