Match each term with the correct statement below.

A. Techniques aimed at ensuring the competency of the members of the organization
B. Strategic methods for ensuring that the organization maintains a secure infrastructure
C. Techniques aimed at ensuring the continuing functioning of the enterprise after an adverse event
D. Techniques aimed at ensuring electronic data
E. Techniques aimed at ensuring secure practice by the employees of the organization
F. Techniques for ensuring that the operating environment of the machine and all of its associated applications remains secure
G. Techniques aimed at evidence collection after an adverse event
H. Techniques aimed at ensuring that the enterprise does not violate a regulation, standard, or law related to security
I. Techniques aimed at ensuring continuous secure functioning of the enterprise

A. IT Security Training and Awareness
B. Strategic Security Management
C. Enterprise Continuity
D. Date Security
E. Personnel Security
F. System and Application Security
G. Digital Forensics
H. Regulatory and Standards Compliance
I. IT Systems Operations and Maintenance

Computer Science & Information Technology

You might also like to view...

The ________ tab can be used to apply a page color

Fill in the blank(s) with correct word

Computer Science & Information Technology

A standard acceptable use policy is fine for the ____ of the system.

A. end-users B. managers C. executives D. administrators

Computer Science & Information Technology