What is the MOST appropriate change management procedure for the handling of emergency program changes?
Who is ultimately responsible for ensuring that information is categorized and that protective measures are taken?
Which of the following documents would be the BES T reference to determine whether access control mechanisms are appropriate for a critical application?
Which of the following is the MOST important process that an information security manager needs to negotiate with an outsource service provider?
In business critical applications, where shared access to elevated privileges by a small group is necessary, the BEST approach to implement adequate segregation of duties is to: