Problem
What are the devices and components used in the System/Application Domain? Which controls provide security? How do business continuity planning and disaster recovery planning help maximize C-I-A? How do database and drive encryption help maximize C-I-A?