_________ is a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity, and reliability.

Fill in the blank(s) with the appropriate word(s).


IT security management

Computer Science & Information Technology

You might also like to view...

Another name for a font or font family is a(n) ____.

A. typeface B. textface C. text block D. point size

Computer Science & Information Technology

Which Add to option is NOT available in the field section on the PivotTable Field List?

A. Add to Report Filter B. Add to Column Filter C. Add to Column Labels D. Add to Row Labels

Computer Science & Information Technology

What character, when appended to a command, causes the command to be run in the background?

A. $ B. & C. % D. #

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. To implement a physical security program an organization must conduct a risk assessment to determine the amount of resources to devote to physical security and the allocation of those resources against the various threats. 2. Physical security must also prevent any type of physical access or intrusion that can compromise logical security. 3. For information systems, the role of logical security is to protect the physical assets that support the storage and processing of information. 4. Physical security must prevent misuse of the physical infrastructure that leads to the misuse or damage of the protected information. 5. Misuse of the physical infrastructure includes vandalism, theft of equipment, theft by copying, theft of services, and unauthorized entry.

Computer Science & Information Technology