A critical device is delivered with a single user and password that is required to be shared for multiple users to access the device. An information security manager has been tasked with ensuring all access to the device is authorized. Which of the following would be the MOST efficient means to accomplish this?
In performing a risk assessment on the impact of losing a server, the value of the server should be calculated using the:
When a new key business application goes into production, the PRIMARY reason to update relevant business impact analysis (BIA) and business continuity/disaster recovery plans is because:
Which of the following should be the PRIMARY consideration for an information security manager when designing security controls for a newly acquired business application?