1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
2 years ago
6

Describe the fundamental security policies outlined by PCI DSS, FISMA, and COBIT. In a subsequent paragraph, identify at least 2

types of industries (e.g., Internet service providers, health care, education) and describe which of the latter standard(s) should be considered in that industry. Defend your response.
Computers and Technology
1 answer:
zavuch27 [327]2 years ago
6 0

PCI policies are known to be a kind of security policy that is said to covers how an organization look into or see the 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS).

<h3>What are the areas that PCI DSS covers?</h3>
  • The fundamental security policies of PCI DSS Requirement  covers:
  • Processors and Backup servers
  • Third parties that store or handle PAN.
  • The Outsourced management of systems or equipment and others

Therefore,  PCI policies are known to be a kind of security policy that is said to covers how an organization look into or see the 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS).

Learn more about policies from

brainly.com/question/1578160

#SPJ1

You might be interested in
Computer-aided design software is used by ________.
koban [17]

Answer:

by Architects?

Explanation:

not sure

6 0
2 years ago
What your computer can do to you?
hjlf

Answer:

it can blind you because too much light in ur face is bad

Explanation:

6 0
3 years ago
Read 2 more answers
​to add notes or comments, insert a comment tag using the syntax _____.
Aneli [31]
The needed syntax would be:
<!--comment-->
Hope I could be of assistance! ;)
4 0
4 years ago
Read 2 more answers
These operating systems were referred to as command-based.
alexira [117]

Command-Line Interface (CLI)


3 0
3 years ago
What has the same mass as 0.25 mol of copper atoms?​
Tanzania [10]
????????????what is that
4 0
3 years ago
Other questions:
  • William is an amateur photographer who plans to create a portfolio to improve his career prospects. He wants to capture a mother
    6·1 answer
  • Your dive computer indicates you need to make a mandatory decompression stop. You buddy's dive computer does not. You should: A.
    9·1 answer
  • Alice is adding a chart in a spreadsheet. Which option will allow you her to give the chart a suitable title and subtitle?
    11·2 answers
  • Rachelle's computer has frequent system crashes and it takes a long time to access files and folders. What hardware component is
    8·1 answer
  • What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
    10·1 answer
  • Describe the difference between the circumscribed and inscribed options when using the AutoCAD Polygon command
    14·1 answer
  • Analyze the code and identity the value of variable a,b and c after the code execution. int a=40, b=50, c=60; if(! (a&gt;=40)) b
    15·1 answer
  • Write an algorithm to calculate the average<br> value of array of integer elements
    13·1 answer
  • 2.Some artists look for ways to extend copyright for longer than the laws normally allow. Why do they do this?
    15·1 answer
  • The ________ encloses and protects the power supply, motherboard, processor, and memory of a computer. drive bay solid-state sto
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!