1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
3 years ago
12

____________ is a widely accepted international best practices framework for implementing information systems security.

Computers and Technology
1 answer:
balandron [24]3 years ago
8 0

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

You might be interested in
WILL GIVE BRAINLIEST TO FIRST AND BEST ANSWER!
sladkih [1.3K]

Answer:

1. Write to the Reader

2. Structure your report

3. Back up your report with data

4. Separate facts with opinions

Explanation:

1. Remember that you’re not writing the report for yourself. You’re probably writing for clients or management, so you need to know how familiar they are with the concepts and terminologies that your team uses. If they’re not well-acquainted with it, you may have to spend the first part of your report defining them so readers can follow along. Or, you might want to dumb it down a bit to layman’s terms and cut back on acronyms and jargon. A good way to practice this is to do the same with meeting notes.

2. One thing all reports should have in common is a form of structure. Ideally, you want to organize information into different segments so that your reader can identify relevant sections and quickly refer back to them later on. Common sections include a background or abstract to explain the project’s purpose, and a final summary of the document’s contents.

3. A good project report is going to have lots of data backing it up, whether it is defending the team’s performance or breaking down a successful project. Accurate charts, spreadsheets, and statistics are a must if the report is to have any degree of credibility when presented to clients. Many project management tools provide flexible project reporting features to help PM’s compile and present data in meaningful ways.

4. You should never confuse the two when writing a project report, especially if you are doing a post-mortem on a failed project. Opinions are subjective and should never be presented as absolutes. The report should be scrubbed of any personal views or preferences unless absolutely necessary. And if your opinion is required, be sure to clearly identify it as such. You may want to put it in an entirely different section, if possible.

Hope this helped

Kinda, really good at this stuff.

5 0
3 years ago
Write an exception class named InvalidTestScore. Modify the TestScores class you wrote in Part I so that it throws an InvalidTes
Elan Coil [88]

Answer:

See Explaination

Explanation:

package testscores;

import java.util.ArrayList;

import java.util.List;

public class TestScores {

public List<Integer> scorearray=new ArrayList<>();

public TestScores(List<Integer> scores) throws InvalidTestScore{

this.scorearray=scores;

for(int i=0;i<scorearray.size();i++){

if(scorearray.get(i)>100 || scorearray.get(i)<0){

throw new InvalidTestScore(this.scorearray.get(i));

}

}

}

public double average(){

int tot=0;

for(int i=0;i<this.scorearray.size();i++){

tot=tot+this.scorearray.get(i);

}

return tot*(1.0)/(this.scorearray.size());

}

class InvalidTestScore extends Exception

{

private double amount;

public InvalidTestScore(int Score)

{

System.out.println("Invalid Score "+Score);

}

}

}

8 0
3 years ago
According to the video, what kinds of projects would Computer Programmers be most likely to work on? Check all that apply.
ivann1987 [24]
The answer is computer hardware
3 0
2 years ago
Read 2 more answers
Write a short-essay discussing your own stand on social media usage for students.​
hjlf

Answer:

More than half of the world’s population uses the internet. This is highlighted by social media users increasing by 21% since 2015, with 2.8 billion users reported globally in 2017.

Humans are social animals. We always like to remain in some group or another, and we prefer to follow what this group does. All of our traditions and cultures are the product of <em><u>this</u></em> group-oriented facet of human nature.Everyone is connected to one another in this vast network generated by the Internet.It illuminates the lives of thousands of people by spreading knowledge internationally, thereby making us global citizens. 

<h2><em><u>NOT</u></em><em><u> </u></em><em><u>COPIED</u></em><em><u> </u></em><em><u>ANSWER</u></em><em><u> </u></em></h2>
3 0
2 years ago
What these large numbers in unemployment could mean long term for America?
riadik2000 [5.3K]

Answer:

Im twelve but i know something about economics. The more homeless the more free coupons the government give out which the middle and high class pay for. The more people the higher the taxes and inflation causing the middle class to shrink making only rich and poor people. The U.S. then will have more homeless.

Explanation: Larg bwain finking

6 0
3 years ago
Other questions:
  • Explain what a dam is and what it does
    12·1 answer
  • Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
    7·1 answer
  • A beginning driver may tend to oversteer. This means the driver what? Btw Cars are technology so that is why it is under Compute
    11·1 answer
  • Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
    6·1 answer
  • When a user inserts a PivotTable, where will it be inserted?
    15·1 answer
  • Select the correct answer.
    15·1 answer
  • Which functions are examples of logical test arguments used in formulas? Check all that apply. OR IF SUM COUNT NOT AND
    12·2 answers
  • 30 points Fill in the blanks,<br> Plz leave a explanation
    5·2 answers
  • Can a dod activity enter into a service contract for a military flight simulator without getting a waiver from the secretary of
    13·1 answer
  • Every time a key is pressed on the keyboard, the _______________ chip in the keyboard notices which key has been pressed.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!