A security analyst is classifying data based on input from data owners and other
ID: 3916480 • Letter: A
Question
A security analyst is classifying data based on input from data owners and other stakeholders. The analyst has identfhed three data types 1. Financially sensitive data 2. Project data 3. Sensitive project data The analyst proposes that the data be protected in two major groups, with further access control separating the financially sensitive data from the sensitive project data. The normal project data will be stored in a separate, less secure location. Some stakeholders are concerned about the recommended approach and insist that co-mingling data from different sensitive projects would leave them vulnerable to industrial espionage. Which o the following is the BEST course of action for the analyst to recommend? Conduct a quantitative evaluation of the risks associated with commingling the data and reject or accept the concerns raised by the o B. ?? o D Meet with the affected stakeholders and determine which security controls would be sufficient to address the newly raised risks methods to determine aggregate risk scores for each project and use the derived scores to more finely segregate the data project data increase the number of available data storage devices to provide enough capacity for physical separation of non-sensitiveExplanation / Answer
The best option would be to meet with the affected stakeholders and determine which security controls would be sufficient to address the newly raised risks
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.