Match each term with the correct statement below.
A. Adds process considerations like configuration management and lifecycle process security to cybersecurity
B. The process of establishing and maintaining the security framework.
C. Contributes concepts like security policy and procedure, continuity planning, personnel management, and contract and regulatory compliance to cybersecurity
D. Address essential human factors like discipline, motivation, training, and certification of knowledge in cybersecurity
E. Contributes important ideas about intellectual property rights and copyright protection, privacy legislation, cyber law and cyber litigation, and the investigation and prosecution of computer crimes to cybersecurity.
F. Adds essential recommendations about how to safeguard the electronic transmission and storage of information to cybersecurity
G. Considers the personal and societal implications of information use and information protection with respect to cybersecurity
H. Contributes knowledge about ways to safeguard the processing of information in its electronic form to cybersecurity
I. An omnibus regulation for the federal government and its agencies.
A. Software engineering
B. Governance
C. Business management
D. Behavioral studies
E. Law and law enforcement
F. Networking
G. Ethics
H. Traditional technical studies
I. FISMA
You might also like to view...
Once you've created a style sheet, you can import it into your new site, ____ each page, then modify it as needed.
A. attach it to B. remove it from C. link it to D. save it to
What type of structure is the following set of statements an example of? while not end of file read a line end while
A. selection B. repetition C. decision D. sequence