1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
15

2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components

of security management can be adapted for use in the security management model
Computers and Technology
1 answer:
Leto [7]3 years ago
4 0

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

You might be interested in
How do productivity programs most benefit the way we work and live?
finlep [7]

Answer:

They provide us with ways to communicate, display, and work with information more quickly and accurately.

Explanation:

Productivity programs helps in the provision of information and they also help in increasing productivity by making work less stressful and unambiguous. Examples of productivity programs include design programs and spreadsheet tools.

These programs also create an avenue for providing us with ways to communicate, display and work with information more quickly and accurately.

6 0
4 years ago
WOULD SOMEONE PLEASE ANSWER THIS IVE ASKED TWICE ALREADY!
Rainbow [258]
I think that’s right, hope it helps!:) brainliest??

7 0
3 years ago
How has the widespread shift to remote work caused businesses to reconsider their use of Extended Reality (XR)?.
romanna [79]

The widespread shift to remote work has caused businesses to reconsider their use of Extended Reality (XR) by inspiring them to re-imagine employee experiences and engagement with XR capabilities.

<h3>What is Extended Reality?</h3>

Extended Reality (XR) refers to an umbrella terminology that is used to describe all real and virtual physical environments (realities) and human-machine interactions through the use of various computer technologies and wearables.

In Business management, Extended Reality (XR) are typically used by employers of labor to boost workforce performance, engagement, retention and deliver better experiences to both their employees and customers (clients).

In terms of widespread shift to remote work, businesses have reconsidered their use of Extended Reality (XR) by re-imagining employee experiences and engagement with XR capabilities, so as to boost workforce performance, engagement, and retention.

Read more on Extended Reality here: brainly.com/question/26479902

4 0
3 years ago
Which is the answer?
vesna_86 [32]

Answer:

initial

Explanation:

When a website's creators are in the design process, storyboarding is often part of the initial stages.

3 0
3 years ago
Read 2 more answers
Lonnie has several workbooks that contain financial and sales data. He needs to ensure that if the data in a single cell in one
Rzqust [24]

Answer: Linked cell

Explanation: I just did a test

7 0
3 years ago
Other questions:
  • Describe the four techniques mentioned in the article that help you, the speaker, keep your audience engaged
    9·1 answer
  • Write code to simulate the following differential equation for x ranging from 0 to 5. Assume y = 0 when x = 0. Plot y vs. x usin
    11·1 answer
  • An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks
    6·2 answers
  • Find products that satisfy BOTH conditions below:______
    6·1 answer
  • Which of the following best describes information techonolgy (IT)?
    6·1 answer
  • Why does dew form on grass overnight
    7·1 answer
  • Someone knows a good compiler for iPad? It has to be an app
    10·1 answer
  • Which two characteristics of the matter change?
    14·1 answer
  • Write a program that reads and unspecified number of integers, determines how many positive and negative values have been read,
    10·1 answer
  • Before a computer can use a router, what configuration information must it be provided?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!