Page 29 - 4-Level Funnel Diagram Design for PowerPoint
P. 29

Risk

                Access and by                                                                                                                            monitoring

                  Insert your desired                                                                                                                    Insert your desired
                              whom
                              text here.                                                                                                                 text here.

                                                                                                                                          Testing process
                                           Critical and
                                                                                                                                          Insert your desired access,
                                               xt here.
                                          Confidential                                                                                    (penetration,
                                                                                                                                          text here.
                                           information                                                                                    tracked changes)



                                                          Value of data
                                                                                                                     Insert your desired
                                                       Insert your desired                                      Unauthorized
                                                                  text here.                                    access
                                                                                                                     text here.
                Information accessed,


                processed and stored                                                                                                   Assigning access,
                               Insert your desired
                                                                                                                                            Insert your desired
                                                                                                                                            text here.
                                          text here.                                                                                   approved, monitored
                                                                     Information                                                       & removed

                                                                   transmission
                                                       Insert your desired text here.
                                                                                                        Role based access

                                                            Rigor followed to                           and administrative

                                                            grant and revoke                            Insert your desired text here.
                                                                                                        roles
                                                                              access


                                                       Insert your desired text here.
                                                                                     Risk Factors
   24   25   26   27   28   29   30   31   32   33   34