List four of the common work functions specified in the EBK for the management of network and telecommunications security.
What will be an ideal response?
1. Establish a network and telecommunications security program in line with enterprise goals and policies
2. Manage the necessary resources, including financial resources, to establish and maintain an effective network and telecommunications security program
3. Direct network and telecommunications security personnel
4. Define the scope of the network and telecommunications security program
5. Establish communications between the network and telecommunications security team and related security teams (e.g., technical support, security administration, and incident response)
6. Establish a network and telecommunications performance measurement and monitoring program
7. Ensure enterprise compliance with applicable network-based standards, procedures, directives, policies, regulations, and laws (statutes)
8. Ensure that network-based audits and management reviews are conducted to implement process improvement
9. Ensure that appropriate changes and improvement actions are implemented as required
You might also like to view...
Solver models can be saved and restored
Indicate whether the statement is true or false
Modern computers integrate several different types of memory, such as cache, RAM, hard disk, and floppy disk. Why are different types of memory used, as opposed to the exclusive use of a particular technology? What would be the drawbacks, for example, of using only cache memory, or only hard disk?
What will be an ideal response?