1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
2 years ago
15

2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components

of security management can be adapted for use in the security management model
Computers and Technology
1 answer:
Leto [7]2 years ago
4 0

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

You might be interested in
ASAP BRAINLIEST!!!
Andre45 [30]

Answer:

closed sounds right, dobt take my word for it doe

8 0
3 years ago
What are an administrator's choices for managing file permissions on a drive formatted as fat32?
Alexeev081 [22]
<span>If the drive is a network share, then Share permissions can be used.</span>
6 0
3 years ago
Which step of creating a financial budget involves listing the payroll, rental, and utility costs?
Bingel [31]

Answer:

A. planning and gathering financial information

4 0
3 years ago
Read 2 more answers
All of the following are the four more widely social media networks discussed in the text EXCEPT:
Elan Coil [88]
The answer is E) Groupon
8 0
3 years ago
Read 2 more answers
A _______ object is used for storing data.
Art [367]

I think it would be a hard drive

6 0
2 years ago
Read 2 more answers
Other questions:
  • In procedural programming, where does the flow of control usually route from the main function?
    8·1 answer
  • This program will output a right triangle based on user specified height triangle_height and symbol triangle_char. (1) The given
    9·1 answer
  • The method header of the equals() method within the string class is ____.
    13·1 answer
  • How did the invention of the printing press lead eventually to an increase in the diversity of religious expression?
    7·1 answer
  • Meaning of page break​
    8·1 answer
  • What differentiates physical design from logical design?
    7·1 answer
  • What important feature of an email gives you a clue about what the sender wants to tell you?
    12·2 answers
  • Typing which capitals and exclamation points in an email is an example of
    14·1 answer
  • When we code an algorithm, we need to provide the commands in the order we want the
    10·1 answer
  • The _____ of a story describes the time and location of a story.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!