Which of the following provides the BEST input to determine the level of protection needed for an IT system?
Vulnerability assessment
Asset classification
Threat analysis
Internal audit findings
Submit