The purpose of ________ is to protect information assets and systems against any internal or external threat that might endanger them

a. INTERTEL
b. INFOTEL
c. COMSEC
d. INFOSEC
e. COMSAC


d

Criminal Justice

You might also like to view...

The second step in solving an ethical dilemma using peacemaking and care approaches is to identify all the particular ______ involved.

What will be an ideal response?

Criminal Justice

_________ are places where offenders can work and pay rent while they participate in counseling and/or job training

Fill in the blank(s) with correct word

Criminal Justice

Most incidents of cyber attacks against businesses are reported to law enforcement authorities

Indicate whether the statement is true or false

Criminal Justice

What issues surround the discovery process?

What will be an ideal response?

Criminal Justice