Discuss why a company might need to add roles and competencies to the EBK basic model.

What will be an ideal response?


Once a company has surveyed its operation, it is more than likely to discover that in order to satisfy obvious security needs, it will need to add roles and competencies that do not exist in the basic model. Examples of such a need might be the addition of a biometric specialist role for high-tech access control, or a physical network infrastructure specialist, or even a strategic supply chain manager. Since the original assumption was that the changing nature of any security situation will require adaptation of the basic model, the EBK framework was purposely designed to be easy to expand.

Computer Science & Information Technology

You might also like to view...

It is essential that the people responsible for assuring information follow a disciplined and well-defined ____.

A. evacuation B. pattern C. hierarchy D. process

Computer Science & Information Technology

The server side of the Remote Desktop is __________________

a. The computer to which you are making the connection b. The computer initiating the connection c. Always the computer on which Windows 8.1 is installed d. Never the computer on which Windows 8.1 is installed

Computer Science & Information Technology

?An embedded style sheet includes the style sheet within the _____ tags of the HTML document.

A. ? and B. ? and C. ? and D. ? and

Computer Science & Information Technology

The _____ element chooses among different possible styles to apply to the result  document.

A. ?xsl:otherwise B. ?xsl:when C. ?xsl:test D. ?xsl:choose

Computer Science & Information Technology