O'Reilly logo

Official (ISC)2® Guide to the CAP® CBK®, Second Edition, 2nd Edition by Patrick D. Howard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

Information System Categorization

Categorization of the information system is based on an impact analysis. It is performed to determine the types of information included within the security authorization boundary, the security requirements for the information types, and the potential impact on the organization resulting from a security compromise. The result of the categorization is used as the basis for developing the security plan, selecting security controls, and determining the risk inherent in operating the system.
Certified Authorization Professional (CAP®) Candidate Information Bulletin, November 2010

Topics

  • Defining Sensitivity
  • Data Sensitivity and System Sensitivity
  • Sensitivity Assessment Process
  • Data Classification Approaches ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required