James would like to establish a governing body for the organisation’s change management efforts. What individual or group within an organisation is typically responsible for reviewing the impact of proposed changes?
Bill would like to access a remote file server through a VPN connection. He begins this process by connecting to the VPN and attempting to log in. Applying the subject/object model to this request, what is the subject of Bob’s login attempt?
Will is working with the management team in her company to classify data in an attempt to apply extra security controls that will limit the likelihood of a data breach. What principle of information security is Will trying to enforce?