Proposal of anticipatory solutions |
1) Implementing a vulnerability monitoring policy reduces the risk of breaches and attacks. |
2) Test and test the information system to ensure its robustness using certain test tools. |
3) Implement a risk and vulnerability assessment approach. |
4) Frequently audit the information system. |