The security ____________________ is an outline or structure of the organization's overall information security strategy that is used as a road map for planned changes to its information security environment.
Fill in the blank(s) with the appropriate word(s).
framework
Computer Science & Information Technology
You might also like to view...
Hackers can use ports to communicate with devices in botnets.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
To use different page number formats within the same document, format the preliminary pages and the remainder of the report as separate ____.
A. documents B. pages C. sections D. files
Computer Science & Information Technology