John is conducting a risk assessment for his organisation and is attempting to assign an asset value to the servers in his data centre. The organisation’s primary concern is ensuring that it has sufficient funds available to rebuild the data centre in the event it is damaged or destroyed.
Which one of the following asset valuation methods would be most appropriate in this situation?
George is writing a document that will provide configuration information regarding the minimum level of security that every system in the organisation must meet. What type of document is she preparing?