Discuss the advantage gained by an effective, organization-wide training program.
What will be an ideal response?
The advantage gained by an effective, organization-wide training program of this type cannot be overstated. Security is a complex and multidisciplinary challenge, which is rooted more in individual behavior than technology. Most security problems arise from the failure of individuals to follow correct procedures, or from an individual's inability or unwillingness to comply with security requirements. A properly functioning training program will provide workers with the knowledge necessary to do their jobs correctly. In addition, it will reinforce the cultural and behavioral norms associated with the security operation. Then, if an individual employee subsequently breaches those norms, the organization will be able to enforce accountability. That combination of knowledge and motivation allows the overall cybersecurity goals of the organization to be assured and maintained with confidence.
You might also like to view...
Which of the following positions the file pointer for a file that has been opened for reading and writing?
a) Use the size() member function on the file stream to position the file pointer. b) Use the seekp(arg) fstream member function with the number of records (counting the first record as 0) as argument to position the file pointer. c) Use the seekp(arg) fstream member function with the number of bytes to the record in question (counting the first byte as 0) as argument to position the file pointer. d) Use the sizeof operator to determine the number of bytes in the file stream.
A(n) _____ is a field in a table that is a primary key in another table and that is included to form a relationship between the two tables.?
A. ?encrypted key B. ?foreign key C. ?super key D. ?concatenated key
When creating a chart from data in a worksheet, the data series is surrounded by a(n) ________ border
Fill in the blank(s) with the appropriate word(s).
The two most common network access methods are ____ and token ring.
A. Ethernet B. bus C. star D. peer-to-peer