2, according to the organization's information security strategy and objectives, determine the focus and scope of the assessment.
3. According to the information of past security incidents and threats, determine the risks and vulnerabilities that need to be evaluated.