Fig. 1From: Strengthening information technology security through the failure modes and effects analysis approachList of processes and procedures to ensure CIABack to article page