CNIT 160: Ch 3c: The Risk Management Life Cycle

Sam Bowne
Sam BowneInstructor at CCSF
CNIT 160:
Cybersecurity
Responsibilities
3. Information Risk
Management

Part 3

Pages 125 - 158
Topics
• Part 1 (p. 102 - 115)
• Risk Management Concepts
• Implementing a Risk Management Program
• Part 2 (p. 114 - 125)
• The Risk Management Life Cycle
• Part 3 (p. 125 - 158)
• The Risk Management Life Cycle
• Part 4 (p. 158 - 182)
• Operational Risk Management
Asset Identification and
Valuation
Assets
• Hardware assets
• Servers, network hardware, workstations,
printers, etc.
• May include assets in storage and
replacement components, depending on
scope
• Often poorly inventoried and maintained
• Often omits applications
Asset Tracking Software
• Security scan, patch management, and
asset inventory systems may help
• But they are often poorly maintained
Asset Characteristics
• Identification (model, serial number)
• Value (consider depreciation)
• Location
• Security classification
• Asset group
• Owner
• Custodian
Physical Inventory
• Verify the information in the asset inventory
• Assets may be moved or retired
• Missing assets may have been moved
without authorization or stolen
Subsystem and Software
Assets
• Information Assets
• Customer information
• Intellectual property
• Business operations
• Virtual assets
• Leased, not owned
• But they have a replacement cost
Cloud-Based Information
Assets
• Company information assets held by
another company
• Often overlooked
• Unless you use a cloud access security
broker
Virtual Assets
• Can be deployed without involving other
stakeholders
• Such as purchasing
• Subject to virtual sprawl
• Sometimes automatically generated via
elasticity
• Software-Defined Networking (SDN)
• Facilitates creation of virtual networking
devices
Asset Classification
Asset Classification
• Assigns assets to categories
• Representing usage or risk
• Determines criticality
• Criticality includes:
• Information sensitivity (such as customer
information)
• Operational dependency
Resources
• Criticality forms the basis for
• Information Protection
• Redundancy
• Business continuity planning
• Access management
Best Approach
• First identify and classify information
assets
• Then classify systems
• Often overlooked:
• Unstructured data
• Data residing outside organization's
approved systems
Information Classification
• Analyzedfor value, criticality, integrity, and
sensitivity
• Examples:
• Monetary value
• Operational criticality
• Accuracy or integrity
• Data that must be highly accurate
• Such as price lists
• Sensitivity (like PII)
Classification Levels
Information Handling
Information Handling
System Classification
• Database management server
• Demilitarized zone firewall
• Internet time server
• Facilities can also be classified
Network Segmentation
Asset Valuation
Qualitative Asset Valuation
• Rate from 1 to 10
• Determines which assets are more valuable
than others
Quantitative Asset Valuation
• Replacement cost
• Book value
• Net present value (revenue generation)
• Redeployment cost (virtual machines)
• Creation or reacquisition cost
• Consequent financial cost
• Cost of a breach
Ch 3c-1
Threat Identification
• Internal
• External
• Advanced Persistent Threats (APTs)
• Emerging Threats
Threat Identification
Sources of Threat
Intelligence
Internal Threats
Rogue Employees
Man-Made Threats
• Leaked data by
email, USB,
etc.
• Eavesdropping
• DoS attack
• Fire
Natural Threats
• Earthquake
• Forest fire
• Solar flares
External Threats
Motivations
APTs
• Nation-state espionage
• Work slowly and carefully
• Establish persistent concealed foothold
• Exfiltrate data over a long period of time
Emerging Threats
• New techniques
Vulnerability Identification
• Configuration fault
• Design fault
• Known unpatched weakness
• Undisclosed unpatched weakness
• Undiscovered weakness
• Third-party vulnerabilities
• In cloud services
Risk Identification
• Threats
• Threat actors
• Vulnerabilities
• Asset value
• Impact
Risk, Likelihood, and
Impact
Likelihood
• Hygiene
• Visibility
• Velocity (warning or foreknowledge)
• Motivation
• Skill
Impact
Qualitative Risk Analysis
Risk Analysis Techniques
and Considerations
Dimensions of an Asset
Gathering Information
Risk Analysis Types
• Qualitative
• Higher v. lower
• Semiquantitative
• Scale 1 to 5
• Quantitative
• Actual costs
• Difficult to measure event probability and
costs
Quantitative Risk Analysis
• Asset Value (AV)
• Exposure Factor (EF)
• Single Loss Expectancy (SLE)
• Annualized Rate of Occurrence (ARO)
• Annualized Loss Expectancy (ALE)
OCTAVE
• Operationally Critical Threat Asset and
Vulnerability Evaluation
• Risk analysis approach developed at
Carnegie Mellon University
OCTAVE
• Step 1: Establish risk measurement criteria
• Step 2: Develop an information asset
profile
• Step 3: Identify information asset
containers
• Step 4: Identify areas of concern
OCTAVE
• Step 5: Identify threat scenarios
• Step 6: Identify risks
• Step 7: Analyze risks
• Step 8: Select mitigation approach
Other Risk Analysis
Methodologies
• Delphi method
• Questionnaires given to experts
• Event Tree Analysis (ETA)
• Derived from FTA, models a threat scenario
• Fault Tree Analysis (FTA)
• Diagram of consequences for an event scenario
• Monte Carlo Analysis
• Simulates a system using minimum, likely, and
maximum values
Risk Evaluation and
Ranking
Risk Ownership
• Assign individual risks to individual people
• Middle- or upper-management leaders
• Owners also own controls and resources
• Make risk treatment decisions
• Accountable
Risk Treatment
Framework for Risk
Acceptance
Revisiting an Accepted Risk
Controls
• Common outcome of risk treatment
• Procedures or technical controls
Legal and Regulatory
Considerations
• Mandatory protective measures
• PCI-DSS has these
• Optional protective measures
• HIPAA has these
• Mandatory risk assessments
• PCI-DSS requires them
Compliance Risk
• Consequences of non-compliance
• With a law, regulation, or legal obligation
• Two forms
• Actual security incident
• Fines and sanctions for mere
noncompliance
• Business may pay fines rather than comply
Costs and Benefits
• Change in threat probability
• Change in threat impact
• Change in operational efficiency
• Total Cost of Ownership (TCO)
TCO
Ch 3c-2
1 of 61

Recommended

CNIT 160: Ch 3c: The Risk Management Life Cycle by
CNIT 160: Ch 3c: The Risk Management Life CycleCNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160: Ch 3c: The Risk Management Life CycleSam Bowne
88 views61 slides
CNIT 160 Ch 4b: Security Program Management by
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementSam Bowne
178 views58 slides
CNIT 160 Ch 4a: Information Security Programs by
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsSam Bowne
328 views55 slides
CNIT 160 Ch 4b: Security Program Management by
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementSam Bowne
469 views58 slides
CNIT 160: Ch 3d: Operational Risk Management by
CNIT 160: Ch 3d: Operational Risk ManagementCNIT 160: Ch 3d: Operational Risk Management
CNIT 160: Ch 3d: Operational Risk ManagementSam Bowne
335 views77 slides
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program by
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramCNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a ProgramSam Bowne
240 views42 slides

More Related Content

What's hot

CNIT 160: 3. Information Risk Management (Part 4) by
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)Sam Bowne
249 views77 slides
CNIT 160: Ch 3b: The Risk Management Life Cycle by
CNIT 160: Ch 3b: The Risk Management Life CycleCNIT 160: Ch 3b: The Risk Management Life Cycle
CNIT 160: Ch 3b: The Risk Management Life CycleSam Bowne
381 views38 slides
CNIT 160 4b: Security Program Management (Part 2) by
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)Sam Bowne
179 views60 slides
CNIT 160: Ch 2a: Introduction to Information Security Governance by
CNIT 160: Ch 2a: Introduction to Information Security GovernanceCNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security GovernanceSam Bowne
301 views85 slides
Ch 3a: Risk Management Concepts by
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management ConceptsSam Bowne
162 views43 slides
CNIT 160 4d Security Program Management (Part 4) by
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)Sam Bowne
127 views65 slides

What's hot(20)

CNIT 160: 3. Information Risk Management (Part 4) by Sam Bowne
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
Sam Bowne249 views
CNIT 160: Ch 3b: The Risk Management Life Cycle by Sam Bowne
CNIT 160: Ch 3b: The Risk Management Life CycleCNIT 160: Ch 3b: The Risk Management Life Cycle
CNIT 160: Ch 3b: The Risk Management Life Cycle
Sam Bowne381 views
CNIT 160 4b: Security Program Management (Part 2) by Sam Bowne
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)
Sam Bowne179 views
CNIT 160: Ch 2a: Introduction to Information Security Governance by Sam Bowne
CNIT 160: Ch 2a: Introduction to Information Security GovernanceCNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160: Ch 2a: Introduction to Information Security Governance
Sam Bowne301 views
Ch 3a: Risk Management Concepts by Sam Bowne
Ch 3a: Risk Management ConceptsCh 3a: Risk Management Concepts
Ch 3a: Risk Management Concepts
Sam Bowne162 views
CNIT 160 4d Security Program Management (Part 4) by Sam Bowne
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
Sam Bowne127 views
CNIT 160 Ch 4 Information Security Program Development (Part 3) by Sam Bowne
CNIT 160 Ch 4 Information Security Program Development (Part 3)CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
Sam Bowne146 views
CNIT 160 Ch 4c: Security Program Development (Part 3) by Sam Bowne
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)
Sam Bowne138 views
1. Security and Risk Management by Sam Bowne
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne1.4K views
CNIT 160 4d Security Program Management (Part 4) by Sam Bowne
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
Sam Bowne123 views
CISSP Preparation: Introduction by Sam Bowne
CISSP Preparation: IntroductionCISSP Preparation: Introduction
CISSP Preparation: Introduction
Sam Bowne778 views
2. Asset Security by Sam Bowne
2. Asset Security2. Asset Security
2. Asset Security
Sam Bowne480 views
CISSP Prep: Ch 1: Security Governance Through Principles and Policies by Sam Bowne
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Sam Bowne5.5K views
6. Security Assessment and Testing by Sam Bowne
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
Sam Bowne515 views
3. Security Engineering by Sam Bowne
3. Security Engineering3. Security Engineering
3. Security Engineering
Sam Bowne141 views
7. Security Operations by Sam Bowne
7. Security Operations7. Security Operations
7. Security Operations
Sam Bowne570 views

Similar to CNIT 160: Ch 3c: The Risk Management Life Cycle

MIS: Information Security Management by
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security ManagementJonathan Coleman
2.9K views33 slides
Intro.ppt by
Intro.pptIntro.ppt
Intro.pptRamaNingaiah
5 views51 slides
ch01.ppt by
ch01.pptch01.ppt
ch01.pptsamsam693199
10 views67 slides
CNIT 160 4e Security Program Management (Part 5) by
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
151 views62 slides
ISAA PPt by
ISAA PPtISAA PPt
ISAA PPtRishabhAgrawal695188
25 views29 slides
Assessing System Risk the Smart Way by
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart WaySecurity Innovation
98 views35 slides

Similar to CNIT 160: Ch 3c: The Risk Management Life Cycle(20)

MIS: Information Security Management by Jonathan Coleman
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
Jonathan Coleman2.9K views
CNIT 160 4e Security Program Management (Part 5) by Sam Bowne
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
Sam Bowne151 views
CNIT 50: 9. NSM Operations by Sam Bowne
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
Sam Bowne572 views
Undertake the Risk Analysis Policy by Komal Zahra
Undertake the Risk Analysis PolicyUndertake the Risk Analysis Policy
Undertake the Risk Analysis Policy
Komal Zahra70 views
RISK IDENTIFICATION 18 Aug.pptx by Sameera Amjad
RISK IDENTIFICATION 18 Aug.pptxRISK IDENTIFICATION 18 Aug.pptx
RISK IDENTIFICATION 18 Aug.pptx
Sameera Amjad2 views
Info Security - Vulnerability Assessment by Marcelo Silva
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
Marcelo Silva13.6K views
501 ch 8 risk management tools by gocybersec
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management tools
gocybersec307 views
Application Threat Modeling by Priyanka Aash
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
Priyanka Aash2.2K views
Mnescot controls monitoring by mnescot
Mnescot controls monitoringMnescot controls monitoring
Mnescot controls monitoring
mnescot736 views
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx by ImXaib
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
ImXaib5 views
Threat Intelligence Ops In-Depth at Massive Enterprise by Jeremy Li
Threat Intelligence Ops In-Depth at Massive EnterpriseThreat Intelligence Ops In-Depth at Massive Enterprise
Threat Intelligence Ops In-Depth at Massive Enterprise
Jeremy Li205 views

More from Sam Bowne

Cyberwar by
CyberwarCyberwar
CyberwarSam Bowne
16 views22 slides
3: DNS vulnerabilities by
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
41 views40 slides
8. Software Development Security by
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
24 views85 slides
4 Mapping the Application by
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
62 views88 slides
3. Attacking iOS Applications (Part 2) by
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
33 views45 slides
12 Elliptic Curves by
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
57 views50 slides

More from Sam Bowne(20)

3: DNS vulnerabilities by Sam Bowne
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Sam Bowne41 views
8. Software Development Security by Sam Bowne
8. Software Development Security8. Software Development Security
8. Software Development Security
Sam Bowne24 views
4 Mapping the Application by Sam Bowne
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Sam Bowne62 views
3. Attacking iOS Applications (Part 2) by Sam Bowne
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Sam Bowne33 views
12 Elliptic Curves by Sam Bowne
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Sam Bowne57 views
11. Diffie-Hellman by Sam Bowne
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Sam Bowne61 views
2a Analyzing iOS Apps Part 1 by Sam Bowne
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne42 views
9 Writing Secure Android Applications by Sam Bowne
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Sam Bowne31 views
12 Investigating Windows Systems (Part 2 of 3) by Sam Bowne
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne30 views
12 Investigating Windows Systems (Part 1 of 3 by Sam Bowne
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Sam Bowne59 views
9. Hard Problems by Sam Bowne
9. Hard Problems9. Hard Problems
9. Hard Problems
Sam Bowne43 views
8 Android Implementation Issues (Part 1) by Sam Bowne
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Sam Bowne23 views
11 Analysis Methodology by Sam Bowne
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Sam Bowne12 views
8. Authenticated Encryption by Sam Bowne
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Sam Bowne71 views
7. Attacking Android Applications (Part 2) by Sam Bowne
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Sam Bowne35 views
7. Attacking Android Applications (Part 1) by Sam Bowne
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Sam Bowne29 views
5. Stream Ciphers by Sam Bowne
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne108 views
6 Scope & 7 Live Data Collection by Sam Bowne
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Sam Bowne124 views

Recently uploaded

Career Building in AI - Technologies, Trends and Opportunities by
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and OpportunitiesWebStackAcademy
56 views44 slides
Meet the Bible by
Meet the BibleMeet the Bible
Meet the BibleSteve Thomason
86 views80 slides
MercerJesse3.0.pdf by
MercerJesse3.0.pdfMercerJesse3.0.pdf
MercerJesse3.0.pdfjessemercerail
233 views6 slides
BUSINESS ETHICS MODULE 1 UNIT I_A.pdf by
BUSINESS ETHICS MODULE 1 UNIT I_A.pdfBUSINESS ETHICS MODULE 1 UNIT I_A.pdf
BUSINESS ETHICS MODULE 1 UNIT I_A.pdfDr Vijay Vishwakarma
106 views25 slides
Education of marginalized and socially disadvantages segments.pptx by
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptxGarimaBhati5
59 views36 slides
ANGULARJS.pdf by
ANGULARJS.pdfANGULARJS.pdf
ANGULARJS.pdfArthyR3
54 views10 slides

Recently uploaded(20)

Career Building in AI - Technologies, Trends and Opportunities by WebStackAcademy
Career Building in AI - Technologies, Trends and OpportunitiesCareer Building in AI - Technologies, Trends and Opportunities
Career Building in AI - Technologies, Trends and Opportunities
WebStackAcademy56 views
Education of marginalized and socially disadvantages segments.pptx by GarimaBhati5
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptx
GarimaBhati559 views
ANGULARJS.pdf by ArthyR3
ANGULARJS.pdfANGULARJS.pdf
ANGULARJS.pdf
ArthyR354 views
Women From 1850 To 1950 Essay by Amy Williams
Women From 1850 To 1950 EssayWomen From 1850 To 1950 Essay
Women From 1850 To 1950 Essay
Amy Williams41 views
JRN 362 - Lecture Twenty-Three (Epilogue) by Rich Hanley
JRN 362 - Lecture Twenty-Three (Epilogue)JRN 362 - Lecture Twenty-Three (Epilogue)
JRN 362 - Lecture Twenty-Three (Epilogue)
Rich Hanley46 views
Geology of Ethiopia and the Horn Chapter 2 GeES 1011.pptx by behailugetu
Geology of Ethiopia and the Horn Chapter 2 GeES 1011.pptxGeology of Ethiopia and the Horn Chapter 2 GeES 1011.pptx
Geology of Ethiopia and the Horn Chapter 2 GeES 1011.pptx
behailugetu104 views
Guess Papers ADC 1, Karachi University by Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz119 views
OOPs - JAVA Quick Reference.pdf by ArthyR3
OOPs - JAVA Quick Reference.pdfOOPs - JAVA Quick Reference.pdf
OOPs - JAVA Quick Reference.pdf
ArthyR380 views
Introduction to AERO Supply Chain - #BEAERO Trainning program by Guennoun Wajih
Introduction to AERO Supply Chain  - #BEAERO Trainning programIntroduction to AERO Supply Chain  - #BEAERO Trainning program
Introduction to AERO Supply Chain - #BEAERO Trainning program
Guennoun Wajih142 views
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37 by MysoreMuleSoftMeetup
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Payment Integration using Braintree Connector | MuleSoft Mysore Meetup #37
Boston In The American Revolution by Mary Brown
Boston In The American RevolutionBoston In The American Revolution
Boston In The American Revolution
Mary Brown38 views
GSoC 2024 .pdf by ShabNaz2
GSoC 2024 .pdfGSoC 2024 .pdf
GSoC 2024 .pdf
ShabNaz250 views

CNIT 160: Ch 3c: The Risk Management Life Cycle