CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 43

14. ____ ensures that only those with the rights and privileges to access information are able to do so. 15. ____ is a risk control approach that attempts to shift the risk to other assets, other processes, or other organizations. 16. A ____ attack seeks to deny legitimate users access to services by either tying up a server’s available resources or causing it to shut down. 17. Information assets have ____ when authorized users - persons or computer systems - are able to access them in the specified format without interference or obstruction. 18. The purpose of the ____ is to define the scope of the CP operations and establish managerial intent with regard to timetables for response to incidents, recovery from disasters, and reestablishment of operations for continuity. 19. The ____ job functions and organizational roles focus on protecting the organization’s information systems and stored information from attacks. 20. The ____ is the point in time by which systems and data must be recovered after an outage as determined by the business unit. 21. Within an organization, a(n) ____ is a group of individuals who are united by shared interests or values and who have a common goal of making the organization function to meet its objectives. 22. The ____ is used to collect information directly from the end users and business managers. 23. The final component to the CPMT planning process is to deal with ____.