A critical information system within your organization contains PII
A critical information system within your organization contains PII
or HII. During the course of an ISA-CMM assessment, it is discovered that the access controls implemented on the information system are ‘by passable’. Identify whether such a vulnerability is an ‘exploitable’ vulnerability or a ‘non-exploitable’ vulnerability, providing definitions of each to support your reasoning. What is the impact of this vulnerability and how would you rate the risk?