To optimize an organization’s business contingency plan (BCP), an IS auditor should recommend conducting a business impact analysis (BlA) in order to determine:
Which testing should an IS auditor recommend be performed NEXT to verify the adequacy of the new BCP?
Talking about the different approaches to security in computing, the principle of regarding the computer system itself as largely an untrusted system emphasizes: