1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
15

2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components

of security management can be adapted for use in the security management model
Computers and Technology
1 answer:
Leto [7]3 years ago
4 0

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

You might be interested in
___________ is a mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or
GaryK [48]

Answer: Package software

Explanation:

Packaged software is the software that contains the functions and programs that are similar in the nature and features.

It is designed in such a way so that it can attract the customers and user by providing the benefit of the selling of the collection of programs rather than buying individual software programs which costs higher.

Thus, it produced at a large scale as well as bought by numerous users.

4 0
4 years ago
What is the name of the image window area that identifies the project you are working on?
Natali5045456 [20]
The answer is the title bar becuase it would tell the name of the project or something else such as when you are using Words then it would tell you the name of the title of the document you are doing.
6 0
4 years ago
Read 2 more answers
Each modern computer system is equipped with a compiler. ___ .
oksano4ka [1.4K]
False, modern computers don't need to compile direct source code from users. There are DUIs (direct user interface) that allows the user to interact with a computer without coding.
6 0
4 years ago
Read 2 more answers
What happens when two computers use the same IP address?
olga nikolaevna [1]

Answer:

Two computers can safely have the same IP address in certain cases. In most cases, if those two computers are on the same local network, it breaks connectivity for one or both of them. Internet protocols work by sending small, individually addressed messages. Each message can be routed differently.

Explanation:

5 0
3 years ago
Read 2 more answers
Which of the following is true of public methods?
I am Lyosha [343]

Answer:

D) They can be accessed by any method in the same program

Explanation:

Public methods is a form of access modifier in a programming language such as Java, Phython, C#. However, unlike other types of access modifiers like Private Methods, Protected Methods etc they do not put any form of restriction on the access. Hence, in Public Methods members, methods and classes can be accessed from anywhere.

Therefore, what is true of Public Methods is that, they can be accessed by any method in the same program

8 0
4 years ago
Other questions:
  • To keep your audience interested in your speech, you should provide them with as many details as possible about the topic.
    12·1 answer
  • Read the scenario, and then answer the question that follows.
    10·1 answer
  • A viral video is one that can infect your computer with malware. <br> a. True <br> b. False
    6·1 answer
  • When planning your educational and career path, it makes sense to consider where you want to work and what type of work you want
    14·1 answer
  • Declaring single arrays is done with a0 set(s) of straight brackets.
    10·1 answer
  • What should you do to help prepare yourself for the delivery of your presentation? you can chose more then one
    8·1 answer
  • Public static double secret(int first, double second)
    6·1 answer
  • Ashton assigned a string value to a variable. Which program statement should he use?
    5·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
  • MyProgramming Lab
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!