Which of the following statements about the availability concept of Information security management is true?
Which one of the following is NOT a tool or technique that is appropriate for the quantitative risk analysis process?