When management changes the enterprise business strategy, which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:December 21, 2021
  • Reading time:1 mins read

Last Updated on December 21, 2021 by Admin

When management changes the enterprise business strategy, which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?

  • Risk management
  • Change management
  • Access control management
  • Configuration management
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments