1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
4 years ago
12

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and

security principles that can direct the security team in the development of a security:____________.
Computers and Technology
1 answer:
jolli1 [7]4 years ago
7 0

Answer:

Security blueprint

Explanation:

NIST 800-14 provides an understanding of the fundamental security requirements and security blueprints that most IT systems should include, serving as a reference for companies or organizations that desire to create and review their IT security programs.

The principles established a foundation for a concrete system security program and this practices directs organizations on the types of controls, objectives and processes that are involved in an effective and efficient IT security program.

You might be interested in
Which of the following is required when operating a cutting or grinding machine?
Natali [406]

Answer:

?

Explanation:

we need the options.

7 0
3 years ago
Read 2 more answers
An array whose elements you can access using a single subscript is a(n) ____ array
Svetlanka [38]
One-dimensional array.
3 0
4 years ago
Prior to the introduction of the Internet and Web, the secure communication of proprietary information in business-to-business e
ss7ja [257]

Answer: Option (B) is correct.

Explanation:

Electronic Data Interchange also known as the EDI is referred to as the the electronic exchange/interchange of business information and data using standardized format, i.e. a process under which an organization sends information and data to another organization electronically instead of using paper. Business organization and several other entities that tends to conduct business electronically known as trading partners.

3 0
3 years ago
With _____, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data
Ket [755]

Answer:

D) Unsupervised Data mining

Explanation:

Unsupervised data mining also refered to as undirected data mining reveals hidden patterns in unlabeled data. In this method, there are no output variables to predict. The aim of an unsupervised data mining technique is to uncover patterns in data based on the relationship between the data points and each other

5 0
4 years ago
When computer networks are connected to each other, the system is called a(n) ____.
KiRa [710]
LAN - Local area network :P
5 0
4 years ago
Other questions:
  • What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually d
    7·1 answer
  • A _____ is an area hosted by a Web server in which project members and colleagues can share documents, models, photos, and other
    6·1 answer
  • Any game suggestions for nintindo switch.​
    10·1 answer
  • What is the main disadvantage of parallel circuits?
    11·1 answer
  • The function of the file server is to : 1. store data and software programs that can be used by client computers on the network.
    12·1 answer
  • Which of these best represents a call to action?
    7·2 answers
  • Which of the following is not an example of Detailed Demographics?
    11·1 answer
  • The InfoBar is located below the ribbon and on top of a message. It is used for which purposes? Check all that apply. showing th
    9·2 answers
  • Effective controls protect ______ from workplace hazards.
    12·2 answers
  • The fractional_part function divides the numerator by the denominator, and returns just the fractional part.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!