107k views
1 vote
Organizations must consider appropriate and allowable downgrading actions to ensure cost-effective, risk-based application of _____________________.

A) Security measures
B) Compliance standards
C) Resource allocation
D) Quality control

1 Answer

4 votes

Final answer:

The correct answer is option A. Organizations must consider appropriate downgrading actions to ensure a cost-effective, risk-based application of security measures, aligning with a graded security model to allocate resources effectively. The proper balance allows for efficient protection and management of sensitive data, with Option A) Security measures being the correct answer.

Step-by-step explanation:

Organizations must consider appropriate and allowable downgrading actions to ensure cost-effective, risk-based application of security measures. By applying security measures that are proportionate to the assessed risks, organizations can avoid overspending while still protecting sensitive information appropriately. Companies undertake these downgrading actions to optimize their resources; for example, lowering the classification level of data that does not require stringent protection levels anymore can reduce security costs while adhering to necessary compliance and information protection standards.

Applying a graded security model helps organizations allocate their resources more effectively, focusing their efforts where the risks are greatest. This means that more robust defenses can be put in place around the most sensitive or critical data, while less critical information can be protected with more cost-effective measures. This type of approach is at the heart of modern cyber security strategies and is vital for the balance between security and efficiency within an organization. Factors that can influence these downgrading decisions include the data’s current value, potential impact of exposure, legal and regulatory requirements, and overall changes in the threat landscape.

Moreover, by maintaining a dynamic and flexible approach to security, companies can adapt quickly to evolving threats and changes in business operations or objectives. This approach prevents stalling innovation and ensures that security practices do not become obsolete, while still staying within the legal and ethical boundaries prescribed by compliance standards. Therefore, the correct answer to the question is Option A) Security measures.

User HalR
by
8.6k points