Match each term with the correct statement below.

A. A perimeter that incorporates all items that will be secured
B. Explicit behaviors implemented to achieve a desired outcome
C. The generic organizing and control principles that an organization uses to underwrite the management of its information function
D. Assurance that the security actions of the organization directly support its goals
E. The tendency for organizational activities to become disorganized over time due to competitive pressure and technological change
F. The level of assessed competence of the management process
G. Decision making that is supported by empirically derived data
H. Quantitative measures of security performance
I. The prescribed activities to achieve the long-range intentions of the organization

A. Boundaries
B. Control objectives
C. Information governance
D. Strategic alignment
E. Process entropy
F. Management capability
G. Quantitative management
H. Security metrics
I. Strategic management plan

Computer Science & Information Technology

You might also like to view...

As you are typing a Word document consisting of several paragraphs, you should hit ENTER at the end of each sentence

Indicate whether the statement is true or false

Computer Science & Information Technology

The copy constructor for a class is called

a. when an object of the class is passed by value to a function. b. when an object of the class is initialized by another object of the class c. when a function returns an object of the class d. all of the above

Computer Science & Information Technology