Investments in information security technologies should be based on:

Investments in information security technologies should be based on:

Investments in information security technologies should be based on:

A.
vulnerability assessments.

B.
value analysis.

C.
business climate.

D.
audit recommendations.

Explanation:

Investments in security technologies should be based on a value analysis and a sound business
case. Demonstrated value takes precedence over the current business climate because it is ever
changing. Basing decisions on audit recommendations would be reactive in nature and might not
address the key business needs comprehensively. Vulnerability assessments are useful, but they
do not determine whether the cost is justified.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Salim Husain

Salim Husain

value analysis means here – cost benefit analysis