Match the following security roles on the left with the job descriptions on the right
1. data owner a. implements the information classification and controls after they are determined
2. data custodian b. monitors user activities to ensure that the appropriate controls are in place
3. security analyst c. determines the classification level of the information for which he is responsible
4. auditor d. assesses the security needs of the organization
1-c, 2-a, 3-d, 4-b
Computer Science & Information Technology
You might also like to view...
With ________, tags are customized for use with content of a specific industry
Fill in the blank(s) with correct word
Computer Science & Information Technology
Write a short program that shows how to defeat the slicing problem.
What will be an ideal response?
Computer Science & Information Technology