Information security governance yields significant benefits. List five.

What will be an ideal response?


1. An increase in share value for organizations2. Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels3. Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care4. Optimization of the allocation of limited security resources5. Assurance of effective information security policy and policy compliance6. A firm foundation for efficient and effective risk management, process improvement, and rapid incident response7. A level of assurance that critical decisions are not based on faulty information8. Accountability for safeguarding information during critical business activities, such asmergers and acquisitions, business process recovery, and regulatory response

Computer Science & Information Technology

You might also like to view...

What type of library consisting of common routines or data is used to support the development of Windows applications?

A. Open source library B. dynamic link library C. software library D. application library

Computer Science & Information Technology

The beginning of a Web address labeled "http:" indicates ________

A) an administrator's username B) speed of transfer for Web pages C) absolutely nothing D) the protocol used to transfer the file

Computer Science & Information Technology

COGNITIVE ASSESSMENT Complex DBMSs maintain a listing of activities that modify the contents of a database. What is this listing called?

A. recovery disk B. backup C. index D. log

Computer Science & Information Technology

Which term refers to a technology that serves as a replacement for Frame Relay and ATM switching?

A. FDM B. TCP/IP C. SONET D. Multi-Protocol Label Switching (MPLS)

Computer Science & Information Technology