Threat analysis - Information Mapping I
From Gender and Tech Resources
Revision as of 10:16, 29 July 2015 by Eva (Talk | contribs) (Created page with "{{Tutorial |Title of the tutorial=Information Mapping Part 1 |Duration (hours)=90m |Learning objectives=x |Prerequisites=x |Methodology=Methodology == Activity 1: Mapping I...")
Title of the tutorial | Information Mapping Part 1 |
---|---|
Attributions | |
Kind of learning session | |
Tutorial category | |
Duration (hours) | 90m "m" can not be assigned to a declared number type with value 90.
|
Learning objectives | x |
Prerequisites | x |
Methodology | Methodology
Activity 1: Mapping Information At Rest (30 minutes)Explain to participants that we're going to conduct an information mapping activity to get a sense of where our important information actually is. |
Number of facilitators involved | 1 |
Technical needs | Flipchart, sticky notes, pens, markers, comic timing |
Theoretical and on line resources | Holistic Security Guide
Security in a Box. https://securityinabox.org Level-up: https://level-up.cc |