1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alisha [4.7K]
3 years ago
8

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and

security principles that can direct the security team in the development of a security:____________.
Computers and Technology
1 answer:
12345 [234]3 years ago
8 0

Answer:

Security blueprints

Explanation:

The NIST 800-14 principles established a security blueprints for a sound system security program and this practices guides organizations on the modes of controls, the procedures and objectives that are involved in an efficient and effective IT security program.

The eight principles defined are:

• The Computer security assists the mission of the respective organization

• It is an important element of a concrete management process

• Computer security are meant to be cost effective

• Owners of computer systems have security responsibilities outside the purview of their own organizations

• Computer security responsibilities and accountability are meant to be made explicit

• Computer security involves a comprehensive and integrated approach

• Periodical re-assessment should be carried out on Computer systems

• Computer security is also controlled by societal factors

You might be interested in
Of the measures of feasibility, questions such as "Does the proposed platform have sufficient capacity for future needs?" and "W
larisa [96]
Operational feasibility !!!!!!!
8 0
4 years ago
What can you add to your presentation from the insert ribbon toolba?
stiks02 [169]

Answer:

anything you want

Explanation:

there are a lot of adons for powerpoint

7 0
3 years ago
What may happen if a larger number of computer users are attempting to access a Web site at the same time that u r??? I think it
Semmy [17]
I think if a large number are accessing at the same time you would have to wait for many to clear up

3 0
3 years ago
How do I start a private conversation?
11111nata11111 [884]
What I do is just Play casual act like they did something and then when they say they didn’t just say oh OK sorry for blaming you and then you guys will start getting to know each other
6 0
3 years ago
Read 2 more answers
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two
qaws [65]

Answer:

Se explaination

Explanation:

/Declaring variables

integer currentPrice

integer lastMonthPrice

integer changeLastMonth

float mortagage

//Reading input

currentPrice = Get next input

lastMonthPrice = Get next input

//Calculating price change

changeLastMonth = currentPrice - lastMonthPrice

//Calculating mortagage

mortagage = (currentPrice * 0.051) / 12

//Printing output

Put "This house is $" to output

Put currentPrice to output

Put "\nThe change is $" to output

Put changeLastMonth to output

Put " since last month." to output

Put "\nThe estimated monthly mortgage is $" to output

Put mortagage to output

3 0
3 years ago
Other questions:
  • Aubrey didnt like to use graphics or images on her slides. She preferred to use only a title for her slides and bullet-poinged t
    14·2 answers
  • Does any body like animal jam
    11·2 answers
  • Write the simplest statement that prints the following on a single line: 3 2 1 Go! Note: Whitespace (blank spaces / blank lines)
    11·1 answer
  • Which of the following declares an abstract method in an abstract C++ class? (Points : 2) public: void print();
    14·1 answer
  • Create two Lists, one is ArrayList and the other one is LinkedList and fill it using 10 state names (e.g., Texas). Sort the list
    6·1 answer
  • Buying a house is most likely a long-term goal for a person of which of these
    9·1 answer
  • Find the names of these cities with temperature and condition whose condition is neither sunny nor cloudy.
    15·1 answer
  • Interface elements include but are not limited to:
    8·1 answer
  • What is utility Software​
    14·1 answer
  • When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!