?
A. A conspiracy or cooperation between two or more individuals or groups to commit illegal or unethical actions.
B. An assessment of the performance of some action or process against which future performance is assessed.
C. An attempt to improve information security practices by comparing an organization's efforts against practices of a similar organization or an industry-developed standard to produce results it would like to duplicate.
D. Workers hired to perform specific services for the organization.
E. The actions that demonstrate that an organization has made a valid effort to protect others and that the implemented standards continue to provide the required level of protection.
F. The requirement that every employee be able to perform the work of at least one other employee.
G. The requirement that all critical tasks can be performed by multiple individuals.
H. A legal standard that requires an organization and its employees to act as a reasonable and prudent individual or organization would under similar circumstances.
I. The data or the trends in data that may indicate the effectiveness of security countermeasures or controls-technical and managerial-implemented in the organization.
J. Workers brought in by organizations to fill positions for a short time or to supplement the existing workforce.
A. collusion
B. baseline
C. benchmarking
D. contract employees
E. due diligence
F. job rotation
G. task rotation
H. standard of due care
I. performance measurements
J. temporary workers
You might also like to view...
When a document is saved as a(n) ________, it can be opened using a Web browser
Fill in the blank(s) with correct word
What ensures that evidence can be presented in a court of law?
A. order of volatility B. separation of duties C. chain of custody D. least privilege