Which of the following are components of the NIST Framework for Improving Critical Infrastructure Cybersecurity? (Select all that apply.)
What will be an ideal response?
a. The organization understands the cybersecurity risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals.
b. Information and records (data) are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information.
c. Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities), processes, and procedures are maintained and used to manage protection of information systems and assets.
d. The information system and assets are monitored at discrete intervals to identify cybersecurity events and verify the effectiveness of protective measures.
e. Recovery processes and procedures are executed and maintained to ensure timely restoration of systems or assets affected by cybersecurity events.
You might also like to view...
With NFS, you can mount shared file systems on remote machines.
Answer the following statement true (T) or false (F)
The forward slash (/) is used to identify a statement as a comment.
Answer the following statement true (T) or false (F)
To create an @keyframes rule, you specify a(n) __________ for the rule after the keyword @keyframes
a. src value b. class value c. length d. name
Item D in the accompanying figure is the Object States panel.
Answer the following statement true (T) or false (F)