In the time-based model of information security, P represents

A) the time it takes to respond to and stop the attack.
B) the time it takes for the organization to detect that an attack is in progress.
C) the time it takes an attacker to break through the various controls that protect the organization's information assets.
D) the time it takes to assess threats and select risk response.

Answer: C

Business

You might also like to view...

A small manufacturing company decides to have its accounting function performed by a medium-sized accounting firm. This is an example of

a. offshoring. b. expatriation. c. outsourcing. d. joining forces through a merger. e. productivity improvement.

Business

Which of the following is a committed line of credit with no fixed maturity?

A) a bridge loan B) evergreen credit C) a promissory note D) a blanket lien

Business