The MAJOR advantage of the risk assessment approach over the baseline approach to information security management is that it ensures:
Which of the following is the MOST likely reason why e-mail systems have become a useful source of evidence for litigation?
When developing a risk-based audit strategy, an IS auditor should conduct a risk assessment to ensure that:
To ensure that audit resources deliver the best value to the organization, the FIRST step would be to: