1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MatroZZZ [7]
3 years ago
11

What should be taken into consideration when determining which critical information should be protected?

Computers and Technology
1 answer:
Korolek [52]3 years ago
4 0

Answer:

What data would cause harm if exposed to adversaries, the type of threats, risks, and vulnerabilities.

Explanation:

Operations security (OPSEC) is a process or method organizations use to analyze or assess data to be protected to prevent data leaks that would cause harm to their activities.

It is always important to determine critical information that should be confidential to the organization as well as potential risks, threats and vulnerabilities in the company.

You might be interested in
PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO
madam [21]

Answer:

I need to have better photos in order to assist you...

Explanation:

I will attempt to get back with you if you can provide more clearer photos.

6 0
3 years ago
Read 2 more answers
The ____ security policy is an executive-level document that outlines the organization's approach and attitude towards informati
artcher [175]

Answer: General

Explanation:

General security policy is the high-level formal document that contains the statement and guidelines for maintaining security goals and aspirations of organizational information .

  • It persist concerns regarding requirement , responsibilities and scope that should be present to maintain information security.
  • This document contains outlines to maintain protection of information from theft, attack ,hacking or any other risk.It works on integrity, availability and confidentiality factor.
3 0
3 years ago
Ohanians “great big secret” is that:
romanna [79]

Answer:

It is that we should put forward a serious cause in a fun way.

Explanation:

Ohanian is the founder of Reddit and a successful Internet-based entrepreneur. He is based in Florida and married to Serena Williams. And he has shared his big secret, and which is no matter how serious a cause might be, your effort should be to present it in a fun way. He follows this secret and has made $70M through it. And all will support him on this, like stress, and a complicated tensed approach can make you ill, and you will never live to re-reading such writing in future, and hence it will be a wastage of time certainly. Some will say we should go by the requirement, but I feel Ohanian is right as fun makes our path to find the solution easy, and in any way, there is a risk of not finding a solution. However, always remember some people die with a smile, and they are always remembered as the world loves such personality since they bring to limelight only happiness.

4 0
3 years ago
The most likely reason that company computers connected to the Internet should use anti-virus protection software is
andreev551 [17]
A virus could get into the computer easily ruining the computer, and without protection on a computer someone could hack into the companies computers easily.
4 0
3 years ago
You would like to help guide your company in choosing between valuing privacy and increasing the company's bottom line. What is
Ainat [17]

In the above case, the option that will help to guide your company in choosing between valuing privacy is a set of internal principles.

<h3>What are internal control principles?</h3>

The principles of internal control are known to be  needed in the management to set methods in place to make sure that company assets are kept.

Therefore, In the above case, the option that will help to guide your company in choosing between valuing privacy is a set of internal principles.

Learn more about internal principles from

brainly.com/question/27015769

#SPJ1

6 0
2 years ago
Other questions:
  • Which of the following are advantages of a local area network, as opposed to a wide area network? select three options
    15·1 answer
  • printStars is a method that accepts a single int argument and returns no value. It prints as many stars as indicated by its argu
    9·1 answer
  • The operating system of a computer is an example of ________ software. science-forum
    7·1 answer
  • When you buy an Xbox 360 can you play online for free
    12·2 answers
  • Why did the creation of ARPANET help with this critical need?
    9·1 answer
  • Not everything is a success all of the time! So do you know which version of Windows was the least popular?
    7·1 answer
  • Number of megabytes of RAM in a computer. qualitative or quantitative? because
    14·1 answer
  • For all of you who listen to podcasts, when do you usually find time to do so?​
    13·1 answer
  • Which image-editing tool can be used to help remove spots and other marks from an image?
    13·1 answer
  • Plz help me this plz
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!