Match each term with the correct statement below.
A. Techniques aimed at ensuring the competency of the members of the organization
B. Strategic methods for ensuring that the organization maintains a secure infrastructure
C. Techniques aimed at ensuring the continuing functioning of the enterprise after an adverse event
D. Techniques aimed at ensuring electronic data
E. Techniques aimed at ensuring secure practice by the employees of the organization
F. Techniques for ensuring that the operating environment of the machine and all of its associated applications remains secure
G. Techniques aimed at evidence collection after an adverse event
H. Techniques aimed at ensuring that the enterprise does not violate a regulation, standard, or law related to security
I. Techniques aimed at ensuring continuous secure functioning of the enterprise
A. IT Security Training and Awareness
B. Strategic Security Management
C. Enterprise Continuity
D. Date Security
E. Personnel Security
F. System and Application Security
G. Digital Forensics
H. Regulatory and Standards Compliance
I. IT Systems Operations and Maintenance
You might also like to view...
The ________ tab can be used to apply a page color
Fill in the blank(s) with correct word
A standard acceptable use policy is fine for the ____ of the system.
A. end-users B. managers C. executives D. administrators