Consider asset valuation techniques 5-7. Which would bemost appropriate and why for the following assets? a. Stolen wireless access point (WAP) b. Exposed intellectual property (IP) c. Phone service loss d. Web application containing privacy data
Consider asset valuation techniques 5-7. Which would bemost appropriate and why for the following assets?
a. Stolen wireless access point (WAP)
b. Exposed intellectual property (IP)
c. Phone service loss
d. Web application containing privacy data