Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?
Which of the following analysis provides a foundation for measuring investment of time, money and human resources required to achieve a particular outcome?