1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
15

2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components

of security management can be adapted for use in the security management model
Computers and Technology
1 answer:
Leto [7]3 years ago
4 0

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

You might be interested in
When did mac start? when did windows start? when did lynux start?
ale4655 [162]

Answer: Macintosh start January 24, 1984

Windows start November 20, 1985

Linux start October 5, 1991

7 0
3 years ago
Read 2 more answers
Computer system with a 32-bit logical address and 4k-byte page size. assume that each entry of a page table consists of 4bytes.
Annette [7]

The number of bits in the physical address is 26 bits. The number of entries in a page table is \mathbf{2^{20}} entries. The size of the page table in a one-level paging scheme is 4MB.

<h3>
What is paging in Operating System?</h3>

Paging is a storage method used in operating systems to recover activities as pages from secondary storage and place them in primary memory. The basic purpose of pagination is to separate each procedure into pages.

We are given the following parameters:

  • 32-bit logical address
  • Page size = 4 KB = \mathbf{2^{12} \ bytes }
  • Size of each Page table entry = 4 bytes

Suppose the system supports physical memory size = 64 MB = \mathbf{2^{26} \ bytes}

Thus, the number of bits in the physical address is computed as:

= \mathbf{log_2 \{Physical-memory-size\}}

=\mathbf{log_2(2^{26})}}

= 26 bits

The number of entries in a page table = logical address space size/page size

The number of entries in a page table \mathbf{= \dfrac{2^{32}}{2^{12}}}

\mathbf{=2^{20}} entries

In a one-level paging scheme, the size of the table is:

= entire no. of page entries × page table size

= \mathbf{2^{20}\times 4 \ bytes}

= 4 MB

b.

suppose that this system supports up to 2^30 bytes of physical memory.

  • The size of the page table will be the same as 4 MB due to the fact that the number of entries, as well as, the page table entry size is the same.

Since the size of the page table surpasses that of a single page. A page cannot include a whole page table. Therefore, the page table must be broken into parts to fit onto numerous pages, and an additional level of the page table is required to access this page table.

  • This is called the Multi-Level Paging system.

Therefore, we can conclude that the number of bits in the physical address is 26 bits, the number of entries in a page table is \mathbf{2^{20}} entries, and the size of the page table in a one-level paging scheme is 4MB.

Learn more about Paging in Operating System here:

brainly.com/question/17004314

#SPJ1

4 0
2 years ago
How many mb are in a gb?
frosja888 [35]

Answer:

1000 megabytes are in a gigabyte

Explanation:

3 0
3 years ago
Once Google Analytics processes data, it’s stored in a database where it can’t be modified.
Svet_ta [14]

Answer:

The answer to this question is true.

Explanation:

Google Analytics is the method of free tracking device which is offered by Google. Google Analytics shows how User visits website. It helps you exactly see the number of visitors that you store in the database.

It offers information about user behavior that can be critical for your business. The google Analytics refers a reference number which cannot be modified .So the given statement is true.

6 0
3 years ago
What is a document?read.Miércoles, 19 de agosto ¡Saludos Mario! ¿Cómo estás amigo? ¿Cómo está tu familia en Caracas? Mi familia
natka813 [3]

Answer:

A Document is a virtual paper that you can type on

Explanation:

A piece of written or electronic paper that provides information or evidence or that serves as an record.

7 0
3 years ago
Other questions:
  • Describe the general process of creating a DataFlow Diagram (DFD)
    7·1 answer
  • To save the changes to the layout of a table, click the Save button on the _____.
    13·1 answer
  • Text that does not fit in a cell
    7·1 answer
  • You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o
    8·2 answers
  • In 1970, the federal government created __________ to both assist and require employers and employees to make the prevention of
    14·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • Joe, a user, has purchased a new mobile device that uses a different OS than his previous one. Joe wants to copy his contacts an
    10·1 answer
  • A ____ is a a set of presentation rules that control how text should look. It is applied to an XML file to change the collection
    9·1 answer
  • Pls help now the question is very hard someone help me pls​
    6·1 answer
  • Tina has taken the time to modify font sizes and colors in a text box and would like to duplicate those settings on other text b
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!