A(n) _______ is the first step for determining which technical information assets should be protected.
Network diagram
Business Impact Analysis
Office floor plan
Firewall
Intrusion detection system
Submit