1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irinina [24]
3 years ago
11

An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo

ing implementation of all subsequent security controls, including information security policies, security education, and training.
Computers and Technology
2 answers:
borishaifa [10]3 years ago
5 0

Answer:

Framework

Explanation:

A Framework is a structure usually used to solve complex issues.

An information security Framework is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.

N76 [4]3 years ago
3 0

Answer:

framework

Explanation:

Information Security Framework is set of agreed policies that is made by top officials and information security experts which contain the procedure of how insecurity issues can be lowered by outlining major issues that must be taken care of. It enable security agent(s) to have more cognitive and intelligent about the security situation of an organization.

You might be interested in
The ________ is an area where you can position fields to use for filtering the PivotTable and thereby enabling you to display a
Studentka2010 [4]

Answer: FILTERS area

Explanation: PivotTable is the kind of a tool that is used for the calculation of the data by analyzing ,summarizing ,comparing it according to the pattern and the sequence of the data.In this this tool. filter is used as the component for the filtering of the data in small/minor unit by analyzing it deeply. Different filter techniques is used in analyzing of the spreadsheet in PivotTable.

3 0
3 years ago
_______ make up the basic structure of a relational database with columns containing field data and rows containing record infor
Klio2033 [76]
QR codes make up the basic structure of a relational database with columns containing field data and rows containing record information.
3 0
4 years ago
Read 2 more answers
This is Very very Important to me[BRAINLIEST)✅​
sineoko [7]

Answer:

Rom

mellisa

Explanation:

pls mark me BRAINLIAST

4 0
3 years ago
Write a program that asks the user to input their first and last names. The first prompt should state:
VikaD [51]

first = input("Please input your first name: ")

last = input("Please input your last name: ")

print(last+", "+first)

I hope this helps!

8 0
3 years ago
Need some help thanks
sergeinik [125]

Answer:

1. There are many ways to write an algorithm. Some are very informal, some are quite formal and mathematical in nature, and some are quite graphical. The instructions for connecting a DVD player to a television are an algorithm. A mathematical formula such as πR2 is a special case of an algorithm. The form is not particularly important as long as it provides a good way to describe and check the logic of the plan.  The development of an algorithm, a plan is a key step in solving a problem. Once we have an algorithm, we can translate it into a computer program in some programming language. Our algorithm development process consists of five major steps.

2. computers only do what you told them to do, so If you wrote something wrong or you wasn't precise enough it might cause a massive damage and cause you to lose a lot of money.

3. You know when a problem should be solved whenever you need to make a decision that is important, or requires human intelligence and a computer doesn’t have human intelligence.

4. The process does sound familiar to me; it is like the mechanism of operation of the computer. Through reflex actions, our bodies take in input and respond sometimes without our control, such as shivering, blinking, and sneezing.

5. The brain uses chemicals to transmit information; the computer uses electricity. Even though electrical signals travel at high speeds in the nervous system, they travel even faster through the wires in a computer. Both transmit information. A computer uses switches that are either on or off ("binary").

5 0
3 years ago
Read 2 more answers
Other questions:
  • Problems with using a single Local Area Network (LAN) to interconnect devices on a premise include ______.
    12·1 answer
  • Identify the mobile device deployment option that gives the user flexibility to select a device, but allows the company to contr
    5·1 answer
  • How has technology fragmented the audience for sports and entertainment<br> commodities?
    10·1 answer
  • You are an interior decorator, confronted with a dark living room. To lighten the room up, you have n candles and want to build
    12·1 answer
  • A group of students want to create an educational online game for computer laboratory in their school which type of network will
    6·1 answer
  • What operating system is an open source program
    15·1 answer
  • 4. Written record of all transactions in your checking account
    5·2 answers
  • Every Java statement ends with: *<br><br> Period<br> Colon<br> Double quote<br> Semicolon
    11·2 answers
  • How do I get the bot token for discord? (scripting etc)
    5·1 answer
  • 236. A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!