Answered step by step
Verified Expert Solution
Question
1 Approved Answer
68) A security analyst is classifying data based on input from data owners and other stakeholders. The analyst has identified three data types 1. Financially
68) A security analyst is classifying data based on input from data owners and other stakeholders. The analyst has identified three data types 1. Financially sensitive data 2. Project data 3. Sensitive project data The analyst proposes that the data be protected in two major groups. with further access control separating the financially sensitive data from the sensitive project data. The normal project data WIll be stored in a separate, less secure location. Some stakeholders are concerned about the recommended approach and insist that co-mingling data from different sensitive projects would leave them vulnerable to industrial espionage. Which of the following is the BEST course of action for the analyst to recommend? A) Conduct a quantitative evaluation of the risks associated with commingling the data and reject B) Meet with the affected stakeholders and determ.ne which security controls would be sufficient C) use qualitative methods to determine aggregate risk scores for each project and use the derived D) Increase the number of available data storage devices to provide enough capacity for physical or accept the concerns raised by the stakeholders. to address the newly raised risks scores to more finely segregate the data separation of non-sensitive project data
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started