Question: A security analyst is classifying data based on input from data owners and other stakeholders. The analyst has identfhed three data types 1. Financially sensitive

 A security analyst is classifying data based on input from data

A security analyst is classifying data based on input from data owners and other stakeholders. The analyst has identfhed three data types 1. Financially sensitive data 2. Project data 3. Sensitive project data The analyst proposes that the data be protected in two major groups, with further access control separating the financially sensitive data from the sensitive project data. The normal project data will be stored in a separate, less secure location. Some stakeholders are concerned about the recommended approach and insist that co-mingling data from different sensitive projects would leave them vulnerable to industrial espionage. Which o the following is the BEST course of action for the analyst to recommend? Conduct a quantitative evaluation of the risks associated with commingling the data and reject or accept the concerns raised by the o B. ?? o D Meet with the affected stakeholders and determine which security controls would be sufficient to address the newly raised risks methods to determine aggregate risk scores for each project and use the derived scores to more finely segregate the data project data increase the number of available data storage devices to provide enough capacity for physical separation of non-sensitive

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!