A security analyst needs to ensure that systems across the organization are protected based on the sensitivity of the content each system hosts. The analyst is working with the respective system owners to help determine the best methodology that seeks to promote confidentiality, availability, and integrity of the data being hosted. Which of the following should the security analyst perform first to categorize and prioritize the respective systems?
kmordalv
Highly Voted 1 year, 5 months agobettyboo
11 months agobelcher29
Most Recent 9 months, 2 weeks agodeeden
1 year, 2 months agoFrog_Man
1 year, 3 months ago