Close
  Indian J Med Microbiol
 

Figure 1: Five steps of a security risk analysis process

Figure 1: Five steps of a security risk analysis process