1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irinina [24]
3 years ago
11

An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo

ing implementation of all subsequent security controls, including information security policies, security education, and training.
Computers and Technology
2 answers:
borishaifa [10]3 years ago
5 0

Answer:

Framework

Explanation:

A Framework is a structure usually used to solve complex issues.

An information security Framework is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.

N76 [4]3 years ago
3 0

Answer:

framework

Explanation:

Information Security Framework is set of agreed policies that is made by top officials and information security experts which contain the procedure of how insecurity issues can be lowered by outlining major issues that must be taken care of. It enable security agent(s) to have more cognitive and intelligent about the security situation of an organization.

You might be interested in
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
nevsk [136]
Here is a Python program:

tmp = input().split(' ')
c = tmp[0]; s = tmp[1]
ans=0
for i in range(len(s)):
if s[i] == c: ans+=1

# the ans variable stores the number of occurrences
print(ans)
5 0
2 years ago
Question #1
arlik [135]

Answer:

Pseudocode and flowchart.

Explanation:

I just got it correct.

8 0
3 years ago
HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has be
nasty-shy [4]

Network technologies specialist Hannah would need to configure: C. RIP version 2 using Internet Protocol Version 4 (TCP/IPv4).

<h3>What is RIP?</h3>

RIP is an acronym for Routing Information Protocol and it can be defined as an intradomain routing protocol which is typically designed and developed based on distance vector routing.

<h3>The types of RIP.</h3>

In Computer networking, there are two main types of Routing Information Protocol (RIP) and these include:

  • RIP version 1.
  • RIP version 2.

RIP version 2 are generally designed and developed to include subnet masks unlike RIP version 1. Thus, Hannah would need to configure RIP version 2 using Internet Protocol Version 4 (TCP/IPv4) allow several machines on different subnets to communicate with each other using broadcasts.

Read more on routing protocol here: brainly.com/question/24812743

4 0
2 years ago
FELLING GENEROUS GIVING AWAY POINTS:)
Liula [17]

Answer:

thanksssssssss

3 0
3 years ago
What section of the outline is represented by "A. Africa?"
nikklg [1K]
I think it’s number one...
7 0
3 years ago
Read 2 more answers
Other questions:
  • What effect did personal computers and internet have on how people acces information
    6·2 answers
  • Which of the following can indicate what careers will be enjoyable ?
    5·1 answer
  • When a number gets assigned to a variable that already has a value __________?
    6·1 answer
  • 1. Actuators apply mechanical force in the form of pressure to overcome
    10·1 answer
  • The code below is supposed to display the name and score for the student with the highest score one time before the program ends
    12·1 answer
  • Write a function called countstuff () that takes as a parameter a character array, and returns an int. The prototype must be:
    6·1 answer
  • You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math
    11·1 answer
  • What is a music composition copyright?
    8·2 answers
  • Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to
    9·1 answer
  • unlike the barcode-based tracking system, a radio frequency identification system offers a .
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!