1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alisha [4.7K]
3 years ago
8

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and

security principles that can direct the security team in the development of a security:____________.
Computers and Technology
1 answer:
12345 [234]3 years ago
8 0

Answer:

Security blueprints

Explanation:

The NIST 800-14 principles established a security blueprints for a sound system security program and this practices guides organizations on the modes of controls, the procedures and objectives that are involved in an efficient and effective IT security program.

The eight principles defined are:

• The Computer security assists the mission of the respective organization

• It is an important element of a concrete management process

• Computer security are meant to be cost effective

• Owners of computer systems have security responsibilities outside the purview of their own organizations

• Computer security responsibilities and accountability are meant to be made explicit

• Computer security involves a comprehensive and integrated approach

• Periodical re-assessment should be carried out on Computer systems

• Computer security is also controlled by societal factors

You might be interested in
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure stat
Leni [432]
If the computer you are using is a laptop that moves from one network to another, you can click the Alternate Configuration tab and configure a static IP address setting for a second network.
4 0
3 years ago
How can you know if the person or organization providing the information has the credentials and knowledge to speak on this topi
Minchanka [31]

Answer:

The affiliation of the writer is that She is on the staff at the Center for Food Safety (CFS).

Explanation:

CFS stands for the Center for Food Safety which is the national non-profitable public environmental and interest advocacy organization that is working for protect the human health and environment by the curbing use of the harmful food productions technologies and by the promoting an organic and other form of the sustainable agriculture.

7 0
3 years ago
Demographics and psychographics influence database marketing.<br><br><br> False<br><br> True
Kamila [148]

Answer:

true is the correct answer

5 0
3 years ago
How do a tubercolosis test work?
Soloha48 [4]
The answer is If a skin or blood TB test is posittive, your doctore mau give you a chest X-ray. They will look for abnormal spots on your lungs or any changes caused by TB.
4 0
3 years ago
Your data warehousing project group is debating whether to create a prototype of a data warehouse before its implementation. The
Dvinal [7]

Answer:

Hmmm, what would i recommand i think you Should learn skills and become innovative  

Explanation:

Sir i'm gonna go toilet and come back

7 0
3 years ago
Other questions:
  • Which consumer document is most likely to help you if you have trouble figuring out how to operate a device
    6·1 answer
  • You open a web page and log into your email. The traffic travels over many routers. What protocol will the routers use to determ
    6·1 answer
  • Define a function that takes two arguments: a string called strText and a number called intNumber. This function will use a repe
    12·2 answers
  • Software enables users to create documents
    13·1 answer
  • Lines s, t, and u are perpendicular bisectors of the sides FGH and meet at J. If JG=2x+2, JH=2y-4, JF=8 and HI=3z-3, find x, y,
    15·2 answers
  • 1.An algorithm used to find a value in an array is called a ______________.
    7·2 answers
  • Assume that x and y are boolean variables and have been properly initialized. !(x || y) || (x || y) The result of evaluating the
    10·1 answer
  • 7. A(n) is the address of a document or other file accessible on the Internet.
    15·1 answer
  • At a family reunion, your cousin takes a picture of both of you with her phone, orders a print of it, and mails it to you with a
    5·1 answer
  • Can someone give me an earsketch song of summer to turn in
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!