Which of the following is used in the practice of Information Assurance (IA) to define assurance requirements?
A. Classic information security model
B. Communications Management Plan
C. Five Pillars model
D. Parkerian Hexad
A. Classic information security model
B. Communications Management Plan
C. Five Pillars model
D. Parkerian Hexad