1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
15

2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components

of security management can be adapted for use in the security management model
Computers and Technology
1 answer:
Leto [7]3 years ago
4 0

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

You might be interested in
How do I fix this stylesheet?
aalyn [17]

Answer:

i dont know

Explanation:

i m really sorry :(

6 0
3 years ago
Chegg A full bootstrap program Select one: a. may be infected by viruses. b. is stored in ROM to ensure to avoid any infection f
harina [27]

Answer:

Option b = "is stored in ROM to ensure to avoid any infection from viruses. "

Explanation:

In order to to understand the fundamentals of an Operating system in computer one needs to know what the bootstrap program is.

The BOOTSTRAP PROGRAM is first program that will run when the computer is switched on, thus the program( the BOOTSTRAP PROGRAM) will be the program to open the OPERATING SYSTEM.

The device in laptops and personal computers known as ROM is an acronym that stands for Read-Only Memory and it is a storage medium. Because of ROM inability to get Virus it is used in the storage of Bootstrap program.

8 0
3 years ago
What is best android apps​
natima [27]

Answer:

brainly

Explanation:

cuz yeah its the best app ever tbh

8 0
3 years ago
Read 2 more answers
Claire wants to use a conditional statement in JavaScript that provides a block of statement to be executed if the condition is
Illusion [34]
C because what she saying doesn’t add up
6 0
3 years ago
Read 2 more answers
Exposure value bracketing
erica [24]

Answer:

refined view is the outcome of exposure value bracketing

Explanation:

sometimes we take more than one photo at different angles to get an insight to an image. It refined the image information and a detail overview can be achieved from exposure value bracketing. The advantages of exposure value bracketing are:

  • proper exposure of pictures
  • can catered the low light situations effectively
  • refined results
  • explanatory view capturing

The dis-advantages of exposure value bracketing are:

  • huge database as we are taking multiple shots
  • Over-exposing the surroundings
5 0
4 years ago
Other questions:
  • When using a graphics editing program, which option allows you to adjust the space around an image?
    15·1 answer
  • Look at the following list of peripheral items and determine what type they are: mouse, keyboard, webcam, microphone. Input Outp
    15·1 answer
  • Que es lo que me recomiendan estudiar? :v
    10·1 answer
  • What are computers used for?
    14·2 answers
  • Create a method to search an un-ordered array of integers for a value, if the value is found return the index of its position in
    10·1 answer
  • Xavier buys a new laptop for $540. He makes a down payment $75 and pays the rest in 6 equal monthly payments, p. What equation r
    7·1 answer
  • What is the output?
    12·1 answer
  • What are the services offered by web-based email?​
    12·1 answer
  • Who is the traitor of UA?<br><br>1 Karishma<br><br>2 Yuga Aoyama<br><br>3 Denki <br><br>4 Mineta
    6·1 answer
  • Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!