1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SCORPION-xisa [38]
3 years ago
6

_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli

cy frameworkC.Change managementD.Policy principles documen
Computers and Technology
2 answers:
Mrac [35]3 years ago
7 0

Answer:

Information systems security

Explanation:

Information Systems Security relates to the procedures and methodologies required to keep information private, confidential accessible and preserving the data integrity and security of the information. These methods apply to access controls, which restrict the unauthorized access to a system, detect and prevent violations of confidentiality, and document these events . Information System Security deals with the security of computer systems, security of data and communication and also deals with the unintentional data related signals , these signals may cause leakage of security information.

A policy framework is framework that points out a set of guidelines or goals, that could be used in decision making  to direct a more comprehensive set of policies, or to guide the ongoing maintenance of the policies of an organization. So this is not true.

Change management is the supervised recognition and execution changes required within a computer system. So its also not true.

Policy principles document refers to the document on policy principles and it defines responsibilities and corresponds to specific policies on more detailed issues. so its not true.

mylen [45]3 years ago
3 0

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

You might be interested in
BUURTAIS
Alisiya [41]

Answer:

what I'm confused ???????

Explanation:

?

4 0
3 years ago
Karlie wants to eat a good breakfast before taking a test
babymother [125]
Yum sounds like a good idea
7 0
4 years ago
Read 2 more answers
The commands available from a menu may change as a result of a users actions
nikklg [1K]
It is True because we can create the text file, move it around and rename it, although there is no option for deletion so it is better to put it in another folder.
4 0
4 years ago
Working with text in presentation programs is similar to using text in other applications. True False
Yuliya22 [10]
I would say true because text is really important so you eant to make it look as good as possible.
8 0
3 years ago
You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro
cluponka [151]

This type of attack can be classified as an active attack.

<h3>The classification of attacks.</h3>

In Cybersecurity, there are four (4) main types of attacks and these include the following:

  • External
  • Passive
  • Inside
  • Active

In this scenario, the type of attack being experienced by the security analyst is an active attack because it was discovered that someone attempted to brute-force the root password on the web server.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

3 0
3 years ago
Other questions:
  • The management of Ventura Inc. approves the purchase of a few computers for the sales team. The management wants only the most b
    8·1 answer
  • A four-foot by six-foot touch screen is a(n) _____.
    15·1 answer
  • What are indexes in a database?
    14·1 answer
  • How much memory did the first smartphone have?
    11·1 answer
  • TP is commonly used to __________ and __________ files to a server.
    5·1 answer
  • What would you use to see what network adapters are installed in your windows computer?
    11·1 answer
  • Escribe todas las posibles combinaciones que pueden haber entre 4 bits.
    11·1 answer
  • A startup disk cannot be detected when booting a computer. The disk's pressence is reported by the system firmware, But Windows
    9·1 answer
  • You arrive at school on Friday for a field trip ! What a lucky day!You need to figure out what room you are in before leaving. Y
    12·1 answer
  • Chloe is not pleased with how four images that she has placed on a web page relate to each other. Which search string will be mo
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!