Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?
A. Security governance
B. Risk management
C. Security portfolio management
D. Risk assessment
A. Security governance
B. Risk management
C. Security portfolio management
D. Risk assessment