1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
15

2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components

of security management can be adapted for use in the security management model
Computers and Technology
1 answer:
Leto [7]3 years ago
4 0

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

You might be interested in
When building systems, the only two entities that constitute software engineering are people and process.
VLD [36.1K]

Answer: False

Explanation: Software engineering is the designing, analyzing, creating the software application as per the requirement of the user. The programming languages is the base for the designing of the application the software engineering field.

At the time of building system ,there is the requirement of many resources for the development.There is the requirement of the software skills, programming knowledge, resources and tools for the working and designing.Thus, there are different resources, people,skills processes, problem solving skill etc required for the building of the system.

7 0
3 years ago
How does inertia affect a person who is not wearing a seatbelt during a collision
disa [49]
Inertia would keep them going the same speed as the car was going. therefore, the person not wearing a seatbelt would be sent flying forward, probably ending up dead
8 0
3 years ago
When you reference a cell or range in a different worksheet, the ____ separates the sheet reference from the cell reference.
Lera25 [3.4K]
B.   !  

(e<span>xclamation point is the symbol that </span>separates<span> a </span>worksheet reference<span> from a </span><span>cell reference)</span>
6 0
3 years ago
Select the correct answer.
8090 [49]

Answer:

Definitally c

Explanation:

6 0
3 years ago
This resource is a collection of 20,000 detailed job profiles. O*NET, the online version of the DOT, is a database of job profil
Digiron [165]

Answer:

The ONET database holds data or details of job profiles available to applicants on the internet.

Explanation:

A database is an important tool in web development. Commercial or e-commerce websites use databases to store important information needed by the customers to make purchases of goods and services.

Other websites like government agencies and research communities use these databases to collect and store data retrieved from visitors to the sites.

5 0
3 years ago
Other questions:
  • (a)Ms word is a isa word processing software ,(b)hub provides physical connection between all computers, State true or false​
    9·2 answers
  • You can pin applications to which two areas?
    11·1 answer
  • A customer struggles with the small print of most smartphones. The customer still likes the idea of using a smartphone for phone
    9·2 answers
  • write an application to presell a limited number of cinema tickets. each buyer can buy as many as 4 tickets. No more than 100 ti
    8·1 answer
  • A large company has a LAN. The manager of the company wants to change it to a WAN
    10·1 answer
  • Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this
    7·1 answer
  • The image below shows an encoding for a black and white pixel image. The first two
    13·1 answer
  • The computer stores currently used programs and data in ________.
    9·2 answers
  • Meaning of mesh topology​
    15·1 answer
  • What correlation is obtained when the pearson correlation is computed for data that have been converted to ranks?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!