Match each term with the correct statement below.

A. A perimeter that incorporates all items that will be secured
B. Explicit behaviors implemented to achieve a desired outcome
C. The generic organizing and control principles that an organization uses to underwrite the management of its information function
D. Assurance that the security actions of the organization directly support its goals
E. The tendency for organizational activities to become disorganized over time due to competitive pressure and technological change
F. The level of assessed competence of the management process
G. Decision making that is supported by empirically derived data
H. Quantitative measures of security performance
I. The prescribed activities to achieve the long-range intentions of the organization


A. Boundaries
B. Control objectives
C. Information governance
D. Strategic alignment
E. Process entropy
F. Management capability
G. Quantitative management
H. Security metrics
I. Strategic management plan

Computer Science & Information Technology

You might also like to view...

Compare inheritance in the EER model (see Chapter 8) to inheritance in the OO model described in Section 11.1.5.

What will be an ideal response?

Computer Science & Information Technology

A(n) ____________________ is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

URL stands for ___________________________________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An appropriate identifier used to store the total transaction amount is total$Amount.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology