Which of the following is NOT used in the practice of Information Assurance (IA) to define
assurance requirements
A.
Classic information security model
B.
Five Pillars model
C.
Communications Management Plan
D.
Parkerian Hexad
Which of the following is NOT used in the practice of Information Assurance (IA) to define
assurance requirements
Which of the following is NOT used in the practice of Information Assurance (IA) to define
assurance requirements
A.
Classic information security model
B.
Five Pillars model
C.
Communications Management Plan
D.
Parkerian Hexad