Which of the following analyses will BEST identify the external influences to an organization’s information security?
A. Gap analysis
B. Business impact analysis
C. Threat analysis
D. Vulnerability analysis.
A. Gap analysis
B. Business impact analysis
C. Threat analysis
D. Vulnerability analysis.