Discuss how to characterize the sensitivity of information.

What will be an ideal response?


The sensitivity of information should be characterized based on the risks a compromise would represent. The highest risk would be associated with compromises that would adversely impact critical information, or which might result in loss of life, significant financial loss, threats to national security, or the inability of the organization to perform its primary mission.

Computer Science & Information Technology

You might also like to view...

Give an example of a deadlock involving only a single process and a single resource.

What will be an ideal response?

Computer Science & Information Technology

You can hide all of a series of layers but one by pressing and holding the ____ key and then clicking the Eye icon for the layer you want to remain visible.

a. Ctrl b. F3 c. Shift d. Alt

Computer Science & Information Technology

When is it okay to touch the inside of a computer that is turned on?

A. When disassembling the computer B. When using a multimeter to measure voltage output C. When reassembling the computer D. When a qualified electronics expert or electrician is present

Computer Science & Information Technology

You can find free or low-cost ________________ images from a variety of online sources.

A. stock B. palette C. flash D. page

Computer Science & Information Technology