List 5 of the 11 specific competencies dictated by the EBK for the ISO function.

What will be an ideal response?


Manage, design, and evaluate data security
Manage and design digital forensics
Manage and evaluate enterprise continuity
Manage, design, and evaluate incident management
Manage and evaluate IT security training and awareness
Manage and evaluate physical and environmental security
Manage, design, and evaluate procurement
Manage, design, and evaluate regulatory and standards compliance
Manage, design, and evaluate risk management
Manage, design, implement, and evaluate strategic management
Manage and evaluate system and application security

Computer Science & Information Technology

You might also like to view...

A(n) ________ query enables you to create a new table or change data in an existing table

Fill in the blank(s) with correct word

Computer Science & Information Technology

Predefined documents that define basic settings, such as fonts, margins, and styles are called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The proofing options included in Word 2013 eliminate the need for you to apply your own proofreading skills

Indicate whether the statement is true or false

Computer Science & Information Technology

An access ______ is a security measure that defines who can access a computer, device, or network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology