1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
3 years ago
13

Which risk management framework does the organization of standardization publish

Computers and Technology
1 answer:
olga2289 [7]3 years ago
3 0

Answer:

ISO 31000:2009 publishes principles and generic guidelines on risk management.

Explanation:

ISO 31000:2009 can be applied to any public, private or community company, organization, society or individual. Hence, ISO 31000:2009 is not particular to either business or area.

ISO 31000:2009 can be implemented during the period of an industry and to a broad variety of actions, including policies and judgments, guidance, methods, functions, plans, goods, services, and assets.

ISO 31000:2009 can be implemented to any type of danger, whatever its kind, whether possessing positive or negative outgrowths.

You might be interested in
What port number is the web server listening on for the web request?
Veronika [31]
80 for HTTP, 443 for HTTPS
8 0
3 years ago
If a surface is. it is exactly vertical
Jobisdone [24]
What are the choices
8 0
3 years ago
When you write contracts, should you list many definitions at the start of the document?
aev [14]

Answer:

You can.

Explanation:

If you want you can, but usually as you cover topics you should list the definitions for each topic then instead of all at the beginning you do not want it to seem like it is a lot.  

4 0
3 years ago
Which factors have increased the need for the latest cybersecurity technologies?
coldgirl [10]

The factors have increased the need for the latest cybersecurity technologies are A. smaller targets, C. customized threats.

<h3>What are the cybersecurity?</h3>

Cybersecurity is the safety of internet-related structures which include hardware, software program and records from cyber threats. The exercise is utilized by people and organizations to defend towards unauthorized get admission to to records facilities and different automated structures.

Cyberattacks can goal a huge variety of sufferers from character customers to organizations or maybe governments. When focused on groups or different organizations, the hacker's aim is normally to get admission to touchy and precious enterprise resources, which include highbrow property (IP), client records or price details.

Read more about the cybersecurity technologies:

brainly.com/question/26260220

#SPJ1

7 0
2 years ago
What is the output for the code below?
alisha [4.7K]
What is output by the code below? int[] array = {33,14,37,11,27,4,6,2,6,7}; System .out.println(array.length); ... int[] array = {5,10,3,6,9,15}; ... int total = 0; ... output by the code below? int j=1, tally=0; while(j<9) { tally++; j++; } System.out.print(tally);.
From quizlet
5 0
2 years ago
Other questions:
  • The equipment that processes data in order to create information is called the _______.
    8·2 answers
  • A(n) ______ is a type of collaborative website that allows users to create, add, modify, or delete website content.
    12·1 answer
  • 2.7 code practice question 1 edhesive
    13·2 answers
  • Discuss the benefits of a system safety effort other than improved safety
    8·1 answer
  • FIGURE A-1—Use the information in this chart to answer Question 1.
    6·1 answer
  • First Person Who Answers Fast As Possible Will Be Marked As Brainiest ​
    12·1 answer
  • How should I do it Please code for Java
    15·1 answer
  • What do application in productivity suites have in common
    5·1 answer
  • What are some common uses of Excel?
    10·1 answer
  • You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest c
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!