A is like saying you will have a system with weak security controls. C is like having a system that doesn't work at all. It is ok to have a system with weak controls, you may fix later of place compensating controls, but it is not ok to buy a system that doesn't work. C is the main concern.
When business units procure IT assets without IT involvement is that data security requirements may not be considered. Without IT involvement, there is a higher likelihood that security standards, policies, and measures may not be adequately addressed during the procurement process, potentially leading to vulnerabilities and data security risks.
A. Data security requirements are not considered.
The primary risk when business units procure IT assets without IT involvement is that data security requirements may not be adequately considered. This can lead to vulnerabilities and potential breaches, which can have serious consequences for the organization. While the other options (B, C, and D) are also potential risks associated with independent procurement of IT assets, data security is typically the most critical concern.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
cybervds
Highly Voted 1 year, 5 months agoRS66
Most Recent 3 months, 2 weeks agoSwallows
8 months agoFAGFUR
1 year agoSuperMax
1 year, 1 month agoBabaP
1 year, 6 months agosaado9
1 year, 6 months ago