Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?
Which of the following is a subset discipline of Corporate Governance focused on information security systems and their performance and risk management?