1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SCORPION-xisa [38]
3 years ago
6

_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli

cy frameworkC.Change managementD.Policy principles documen
Computers and Technology
2 answers:
Mrac [35]3 years ago
7 0

Answer:

Information systems security

Explanation:

Information Systems Security relates to the procedures and methodologies required to keep information private, confidential accessible and preserving the data integrity and security of the information. These methods apply to access controls, which restrict the unauthorized access to a system, detect and prevent violations of confidentiality, and document these events . Information System Security deals with the security of computer systems, security of data and communication and also deals with the unintentional data related signals , these signals may cause leakage of security information.

A policy framework is framework that points out a set of guidelines or goals, that could be used in decision making  to direct a more comprehensive set of policies, or to guide the ongoing maintenance of the policies of an organization. So this is not true.

Change management is the supervised recognition and execution changes required within a computer system. So its also not true.

Policy principles document refers to the document on policy principles and it defines responsibilities and corresponds to specific policies on more detailed issues. so its not true.

mylen [45]3 years ago
3 0

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

You might be interested in
In the early days of photography, cameras were limited to professional photographers because of the knowledge needed to work the
FinnZ [79.3K]
True they had to be developed in a special way in a dark room with several chemicals. 
3 0
4 years ago
Read 2 more answers
Other drivers and pedestrians expect you to be sober and attentive, so you are responsible for ___________.
marysya [2.9K]
Um A is the only logical answer
5 0
3 years ago
Read 2 more answers
PLEASSEE HELP ILL GIVE U A BRAINLIEST IF UR RIGHT!!
Nana76 [90]
It is digital signal 
5 0
3 years ago
Read 2 more answers
Carlos works in the IT department at Sample Bank. He uses a cloud-based e-mail system and has been asked by his manager to estab
vodomira [7]

Answer:

Option (A) i.e., Chargeback is the correct answer to the following question.

Explanation:

In the cloud-computing, Chargebacks is used for the metrics on the e-mail box which is used by the departments or the organizations, by this system, department budgets has been billed for the costs of entertain the department e-mails. It is applied on the expenses of the IT sectors or services for the strategies of the accounting.

Option B is incorrect because billback it is an application that are used in organization for needs to determining the resources of IT.

Option C is incorrect because Showback is the policy that is used by the IT for rise the expenses.

7 0
3 years ago
An interactive media professional would most likely help with
lapo4ka [179]
Interactive media specialists design web pages and other interactive computer applications for use in many different settings. Education requirements vary, but education in aspects of graphic design and in specific programs and programming languages is common.
5 0
4 years ago
Read 2 more answers
Other questions:
  • HELP!!!! I need this ASAP
    9·1 answer
  • What kind of device is a printer? output or input
    13·1 answer
  • Which of the following illustrates an example of a Boolean data type?
    9·1 answer
  • Write a program that prompts the user for an integer and then prints all prime numbers up to that integer.
    7·1 answer
  • Complete the firstMiddleLast() function to return a new string with the first, middle, and last character from string. If string
    9·1 answer
  • This is your code.
    9·1 answer
  • What is the command to list files in Unix and Unix like operating system?​
    15·1 answer
  • Which of the following is true of a procedure? Check all that apply.
    10·2 answers
  • Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.
    8·2 answers
  • Question 1
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!