primary and secondary data using questionnaires, surveys, interviews, as well as desktop and literature
additional security measures.
management procedures, using OIG Risk Assessment Survey, and reports to FMO on weaknesses discovered. The
management procedures, using OIG Risk Assessment Survey, and reports to FMO on weaknesses discovered. The