Determination of the effect of changes to the information system on the security of the information system is called:
a. Validation analysis
b. Verification
c. Impact analysis
d. Continuous improvement