Record Counter Measures for work You do not have access to this note. Post navigationPrevious post: overview of pentesting.Next post: Processes that help in achieving information assurance