From 93b72e0e99d48c432603431401dd2f8f6dd8dc6d Mon Sep 17 00:00:00 2001 From: cgyarbrough <72204189+cgyarbrough@users.noreply.github.com> Date: Fri, 8 Mar 2024 12:34:36 -0500 Subject: [PATCH 1/2] Update enumerating_stakeholders.md Line 30 replaced 'paper' with 'document' Line 26 replaced comment line. --- docs/topics/enumerating_stakeholders.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/topics/enumerating_stakeholders.md b/docs/topics/enumerating_stakeholders.md index 5a7fc9b3..4a429eb7 100644 --- a/docs/topics/enumerating_stakeholders.md +++ b/docs/topics/enumerating_stakeholders.md @@ -23,11 +23,11 @@ We can treat the responsibilities as non-overlapping, and, therefore, we can bui Each of these trees will have different decision points that they take to arrive at a decision about a given unit of work. -{== The next two sections describe the decision space and the relevant decision points that we propose for these two responsibilities within the vulnerability management process. ==} +{==In [Enumerating Decisions](/enumerating_decisions.md), we describe the decision space and the relevant decision points that we propose for these two responsibilities within the vulnerability management process.==} !!! info "Target Audience" - {== The target audience for this paper is professional staff responsible for making decisions about information systems. ==} + {== The target audience for this documentation is professional staff responsible for making decisions about information systems. ==} This audience encompasses a broad class of professionals, including suppliers, system maintainers, and administrators of many types. It also includes other roles, such as risk managers, technical managers, and incident responders. Although every layperson who owns a computing device makes decisions about managing it, they are not the target audience. From 300f2a1b076037e1f06c43284a9edf7f5a11dc69 Mon Sep 17 00:00:00 2001 From: "Allen D. Householder" Date: Fri, 8 Mar 2024 12:36:06 -0500 Subject: [PATCH 2/2] remove highlight tags --- docs/topics/enumerating_stakeholders.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/topics/enumerating_stakeholders.md b/docs/topics/enumerating_stakeholders.md index 4a429eb7..91adc98f 100644 --- a/docs/topics/enumerating_stakeholders.md +++ b/docs/topics/enumerating_stakeholders.md @@ -23,11 +23,11 @@ We can treat the responsibilities as non-overlapping, and, therefore, we can bui Each of these trees will have different decision points that they take to arrive at a decision about a given unit of work. -{==In [Enumerating Decisions](/enumerating_decisions.md), we describe the decision space and the relevant decision points that we propose for these two responsibilities within the vulnerability management process.==} +In [Enumerating Decisions](./enumerating_decisions.md), we describe the decision space and the relevant decision points that we propose for these two responsibilities within the vulnerability management process. !!! info "Target Audience" - {== The target audience for this documentation is professional staff responsible for making decisions about information systems. ==} + The target audience for this documentation is professional staff responsible for making decisions about information systems. This audience encompasses a broad class of professionals, including suppliers, system maintainers, and administrators of many types. It also includes other roles, such as risk managers, technical managers, and incident responders. Although every layperson who owns a computing device makes decisions about managing it, they are not the target audience.