Which of the following should be the PRIMARY consideration for an information security manager when designing security controls for a newly acquired business application?

December 23, 2021 by Admin

Which of the following should be the PRIMARY consideration for an information security manager when designing security controls for a newly acquired business application?

  • Known vulnerabilities in the application
  • The IT security architecture framework
  • Cost-benefit analysis of current controls
  • Business processes supported by the application

Leave a Reply