CIS 502 Course Great Wisdom / tutorialrank.com CIS 502 Course Great Wisdom / tutorialrank.com | Page 14

• 6 A security manager needs to perform a risk assessment on a critical business application, in order to determine what additional controls may be needed to protect the application and its databases. The best approach to performing this risk assessment is: • 7 CIA is known as: • 8 An organization has a strong, management-driven model of security related activities such as policy, risk management, standards, and processes. This model is better known as: • 9 The impact of a specific threat is defined as: