Match the following security roles on the left with the job descriptions on the right

1. data owner a. implements the information classification and controls after they are determined
2. data custodian b. monitors user activities to ensure that the appropriate controls are in place
3. security analyst c. determines the classification level of the information for which he is responsible
4. auditor d. assesses the security needs of the organization

1-c, 2-a, 3-d, 4-b

Computer Science & Information Technology

You might also like to view...

With ________, tags are customized for use with content of a specific industry

Fill in the blank(s) with correct word

Computer Science & Information Technology

Write a short program that shows how to defeat the slicing problem.

What will be an ideal response?

Computer Science & Information Technology