December 23, 2021 by Admin
Which of the following should be the PRIMARY consideration for an information security manager when designing security controls for a newly acquired business application?
- Known vulnerabilities in the application
- The IT security architecture framework
- Cost-benefit analysis of current controls
- Business processes supported by the application