Explain why context is a critical first step in tailoring.

What will be an ideal response?


Context is a critical first step in tailoring. That requirement is often overlooked because the participants in the planning are likely to assume that all of the other members of the organization have the same motivation and commitment to security that they do. Consequently, during the process of developing that security response, these implicit, and often incorrect, assumptions may never be made explicit. The result is that important behavioral considerations, which could have a critical impact on the success or failure of the overall security system, might never be identified or factored into the eventual set of required security practices.

Computer Science & Information Technology

You might also like to view...

Counter-controlled iteration is also known as:

a. Definite iteration b. Indefinite iteration c. Multiple-iteration structure d. Double-iteration structure

Computer Science & Information Technology

What method is shared by CheckBox and RadioButton objects and is called when the object is clicked by the user?

A. Changed() B. ClickedChanged() C. CheckedChanged() D. ValueChanged()

Computer Science & Information Technology

A management model such as the ISO 27000 series deals with methods to maintain systems.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is NOT mandated by the Privacy Rule of the Health Insurance Portability and Accountability Act ("HIPAA")?

A. Covered entities with a direct treatment relationship with a patient must provide the patient with a privacy notice before the first service encounter B. Covered entities must use and disclose protected health information for treatment, payment, and healthcare operations C. Covered entities must train all workforce members on its privacy policies and procedures, as necessary and appropriate for them to carry out their functions D. A covered entity must maintain reasonable and appropriate administrative, technical, and physical safeguards to prevent intentional or unintentional use or disclosure of protected health information

Computer Science & Information Technology