List three factors that should be considered when developing a security plan

What will be an ideal response?


(a)
Sensitivity
of
information,
value
of
resources
(scope
and
purpose).
(b)
Degree
of
management
commitment
to
plan.
(c)
Degree
of
user
understanding
and
acceptance
of
need
for
security
plan.

Computer Science & Information Technology

You might also like to view...

What process is used for the rational management of changes to ICT products?

A. Configuration management B. Project planning C. Measurement D. Information management

Computer Science & Information Technology

What is Double-colon syntax?

What will be an ideal response?

Computer Science & Information Technology

Prepare a structure chart that shows the main program functions for the New Century system.

What will be an ideal response?

Computer Science & Information Technology

Samir is working on a worksheet he received from his colleague. His colleague has forced text to fit within cells using a button on the Home tab, causing the file to look disjointed. In order to bring the cells to their default sizes, Samir should select all the cells and:

A. ?press the Clear button on the Home tab to remove the content in the cells. B. ?press the Delete button in the Cells group on the Home tab to delete the cells. C. ?press the Merge & Center button in the Alignment group on the Home tab. D. ?press the Wrap Text button in the Alignment group on the Home tab.

Computer Science & Information Technology