Financial Supervisory Service Database Risk Assessment Strategy
This content is composed of insights from experienced professionals—ranging from newcomers to those with 35 years of experience—performing vulnerability analysis and evaluation for Financial Security Standards and Major Information and Communication Infrastructure. It is designed to provide valuable information for new employees or experienced professionals transitioning from other fields. Among the various types, Database was selected, and the evaluation criteria are based on the Financial Security Standards. While basic training or handovers are typically based on the previous year's standards, I believe it would be helpful to familiarize yourself with various analysis techniques as well. Since diverse strategies are required for accurate and rapid diagnosis within a limited timeframe, this may also be beneficial for PMs who plan from the perspective of methodology and approach.
1 learners are taking this course
Level Intermediate
Course period 6 months

