The security ____________________ is an outline or structure of the organization's overall information security strategy that is used as a road map for planned changes to its information security environment.

Fill in the blank(s) with the appropriate word(s).

framework

Computer Science & Information Technology

You might also like to view...

Hackers can use ports to communicate with devices in botnets.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To use different page number formats within the same document, format the preliminary pages and the remainder of the report as separate ____.

A. documents B. pages C. sections D. files

Computer Science & Information Technology