1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irinina [24]
3 years ago
11

An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo

ing implementation of all subsequent security controls, including information security policies, security education, and training.
Computers and Technology
2 answers:
borishaifa [10]3 years ago
5 0

Answer:

Framework

Explanation:

A Framework is a structure usually used to solve complex issues.

An information security Framework is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.

N76 [4]3 years ago
3 0

Answer:

framework

Explanation:

Information Security Framework is set of agreed policies that is made by top officials and information security experts which contain the procedure of how insecurity issues can be lowered by outlining major issues that must be taken care of. It enable security agent(s) to have more cognitive and intelligent about the security situation of an organization.

You might be interested in
Are our current copyright policies helping society or hurting society? i need help
Oksanka [162]

Answer:

helping society

Explanation:

it can help you to protect your works and creativity and brilliant ideas from liars and cheaters and frauds

5 0
3 years ago
Why does a thermostat blade bend when heated or cooled?
serg [7]
A thermostat blade bends when temperature change happens because  it is made of two different materials which has different reaction to the temperature. Hope this answers the question. Have a nice day. Thank you for asking here.
6 0
3 years ago
A security system is desired that can be used to detect whenever any one of two doors in a house and any one of two windows are
Sedaia [141]

Answer:

Z = A + B

Explanation:

The logic network can be seen attached below. This basically shows that if either of the two inputs are True then the output would apply. In this scenario, the output would be the alarm going off. Since either one of the windows being opened in this scenario would set off the alarm then the logic operator that needs to be used would be OR. In this scenario, the two windows are represented by the variables A and B while the output can be represented by the variable Z. Using these variables, we can apply the following boolean expression.

Z = A + B

8 0
3 years ago
Given that k and j each refer to a non-negative int and that play_list has been defined to be a list with at least j elements, w
Vlada [557]

Answer:

Following are the program in the Python Programming Language

#list type variable

play_list = [10,20,30,40,50,60,70,80]

k=3    #integer type variable

j=len(play_list)   #integer type variable

new_list=play_list[k:j]  #solution is here

print("play_list: ",play_list)   #print variable play_list

print("new_list:  ",new_list)    #print variable new_list

<u>Output</u>:

play_list:  [10, 20, 30, 40, 50, 60, 70, 80]

new_list:   [40, 50, 60, 70, 80]

Explanation:

Here, we set the list type variable "play_list" and assign elements in it is  [10,20,30,40,50,60,70,80]  then, we set an integer type variable "k" and assign value is 3.

  • Then, we set an integer type variable "j" and assign the length of the variable "play_list" in it.
  • Then, set the list type variable "new_list" and assign the elements of the variable "play_list" after applying slicing on it.
  • Finally, print the variable "play_list" and the variable "new_list".
6 0
4 years ago
Which xxx completes the code to read every integer from file "data. txt"? fileinputstream inputstream = null; scanner infs = nul
luda_lava [24]

Answer:

total+ infs . nex (xxx){total}

Explanation:

this is correct theres nothing wrong

3 0
2 years ago
Other questions:
  • Discuss in detail why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal
    6·1 answer
  • Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
    14·1 answer
  • Universal containers regularly imports Accounts from an external order system that has its own ID field for each record.What sho
    8·1 answer
  • Can someone please tell me how to download tor browser onto a Linux laptop?
    8·1 answer
  • Explain the major innovation made from the establishment of abacus to present 5th computer generation.
    7·1 answer
  • How large must a group of people be in order to guarantee that there are at least two people in the group whose birthdays fall i
    9·1 answer
  • Which of the following correctly orders the units of measure from least to greatest?
    7·2 answers
  • How do you make a minecraft server. just the basics please. I only need ine for me and my friends.
    7·2 answers
  • The optical phenomenon that allows us to view rapidly changing still images as moving images is called _______.
    15·2 answers
  • You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!