Which of the following processes has the goal to ensure that any change does not lead to reduced or compromised security?
Which of the following formulas was developed by FIPS 199 for categorization of an information system?