Which of the following is the MOST effective method of determining security priorities?
A. Impact analysis
B. Threat assessment
C. Vulnerability assessment
D. Gap analysis
A. Impact analysis
B. Threat assessment
C. Vulnerability assessment
D. Gap analysis