Match each item with a statement below.
A. Created by management to guide the implementation and configuration of a specific technology so as to direct the way a technology is to be used to control the behavior of people in the organization.
B. Provides detailed information and hands-on instruction to employees to prepare them to perform their duties securely.
C. The set of activities taken to plan for, detect, and correct the impact of an incident on information assets.
D. Ensures that critical business functions continue if a catastrophic incident or disaster occurs.
E. Set of rules for the protection of an organization's information assets.
F. Published, scrutinized, and ratified by a group.
G. Informal part of an organization's culture.
H. Basis for the design, selection, and implementation of all security program elements, including policy implementation, ongoing policy management, risk management programs, education and training programs, technological controls, and maintenance of the security program.
I. Investigation and assessment of the impact that various attacks can have on the organization.
A. managerial guidance SysSP document
B. security training
C. incident response
D. business continuity plan
E. information security policy
F. de jure
G. de facto
H. security blueprint
I. business impact analysis
You might also like to view...
Layer ____ help you manage and organize layers in a logical manner.
a. presets b. groups c. locks d. clusters
Word processing software can help create the visual backdrop for speeches, lectures, and demonstrations.
Answer the following statement true (T) or false (F)
The easiest way to install Ruby on Rails on a computer running Windows is through the fxri-interactive Ruby and Help Console.
Answer the following statement true (T) or false (F)
What happens if you select a file in the Local Site window and click the Get button?
What will be an ideal response?