List three of the seven activities specified by the EBK as part of the measurement perspective for security of operations.

What will be an ideal response?


1. Review strategic security technologies
2. Review performance and correctness of applied security controls in accordance with standards, procedures, directives, policies, regulations, and laws (statutes), and apply corrections as required
3. Assess the performance of security administration measurement technologies
4. Assess system and network vulnerabilities
5. Assess compliance with standards, procedures, directives, policies, regulations, and laws (statutes)
6. Identify improvement actions based on reviews, assessments, and other data sources
7. Collect IT security performance measures to ensure optimal system performance

Computer Science & Information Technology

You might also like to view...

Which of the following terms means that the people who are conversing on a computer are online at the same time?

A. automatic B. real-world C. real time D. mainline

Computer Science & Information Technology

________ software consists of operating systems, utilities, device drivers, and language translators.

A. Mobile B. System C. Device D. Suite

Computer Science & Information Technology

Some small devices, like the better smartphones, use a technology known as _______________ that lights the screen with an organic compound.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. A working model of the proposed system's essential functionality B. Verifies that each individual program or object works by itself C. Whether designed for a small or large computer, most DBMSs perform common ones. D. Verifies that an application works with other applications E. Performed by end users and checks the new system to ensure that it workswith actual data F. The smallest unit of data a user accesses G. The collection and summarization of data, information, and deliverables H. What each byte represents in ASCII I. A group of related fields J. A field that uniquely identifies each record in a file K. Has special keywords and  rules that users include in statements L. A measure of how suitable the development of a system will be to the organization M. This database capability is one of the more powerful database features. N. Kind of rules that decrease data entry errors, and thus enhance the data's integrity O. While a user is working with the database, this resides in the memory of the computer.

Computer Science & Information Technology