News

In an interactive exercise based on a scenario at a fictional facility, participants identified which digital assets must be protected by analysing the functions of computer-supported systems and ...