SlideShare a Scribd company logo
Complete each section of the worksheet using the text
book
s and course materials provided in Week
2
.
1.
The set of laws, rules, directives, and practices that regulate
how an organization manages, protects, and distributes
controlled information is called _______.
2.
The security concept that states every user should be
responsible for his or her own actions is called
_______.
3.
The individual who is responsible for deciding on the access
rights to the information for various personnel is called an
_______.
4.
Physical, technical, and administrative controls used to protect
information systems are called
_______.
5.
The probability that a particular threat will exploit a particular
vulnerability of an information system is called _______.
6.
An event, process, activity,
or
substance that has an adverse effect on organizational assets is
called a
_______.
Federal Information Security Management Act (FISMA) of 2002
Terminology Matching
Match the terminology with the correct definition by inserting
the corresponding letter in the answer column.
Terminology
Answer
Definitions
7.
Authorize
A. Information systems and internal information are grouped
based on impact.
8.
Supplement
B. The step where an initial set of security controls for the
information system are chosen and tailored to obtain a starting
point for required controls
9.
Monitor
C. Assess the risk and local conditions, including the security
requirements, specific threat information, and cost–benefit
analysis to increase or decrease security controls.
10.
Categorize
D. Step where the original and supplement controls are put in
writing
11.
Document
E. Original and supplement controls are applied to the system.
12.
Select
F. Security controls are evaluated to see if they are implemented
correctly and are operating as intended.
13.
Assess
G. Evaluation of risk to organizational operations,
organizational assets, or individuals that leads to this action
14.
Implement
H. Requires checking and assessing the selected security
controls in the information system on a continuous basis

More Related Content

Similar to Complete each section of the worksheet using the textbooks and.docx

Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
IJNSA Journal
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
adampcarr67227
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
soulscout02
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
BPalmer13
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
moggdede
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate Metrics
CSCJournals
 
Instructor Manual Principles of Information Security, 7th Edition by Michael ...
Instructor Manual Principles of Information Security, 7th Edition by Michael ...Instructor Manual Principles of Information Security, 7th Edition by Michael ...
Instructor Manual Principles of Information Security, 7th Edition by Michael ...
Donc Test
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
durantheseldine
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
eugeniadean34240
 
The Three Dimensions of Security
The Three Dimensions of SecurityThe Three Dimensions of Security
The Three Dimensions of Security
CSCJournals
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
toltonkendal
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
Luxembourg Institute of Science and Technology
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
christophefeltus
 
Cmgt 400 entire course
Cmgt 400 entire courseCmgt 400 entire course
Cmgt 400 entire course
descdemesme1977
 
Domain 2 - Asset Security
Domain 2 - Asset SecurityDomain 2 - Asset Security
Domain 2 - Asset Security
Maganathin Veeraragaloo
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessmentjenito21
 
HIPAA compliance MA Healthcare scenario
HIPAA compliance MA Healthcare scenarioHIPAA compliance MA Healthcare scenario
HIPAA compliance MA Healthcare scenarioBrian Wong
 
Cmgt 400 week 4 team assignment security policy and training
Cmgt 400 week 4 team assignment security policy and trainingCmgt 400 week 4 team assignment security policy and training
Cmgt 400 week 4 team assignment security policy and training
cordnesslacge1978
 

Similar to Complete each section of the worksheet using the textbooks and.docx (20)

Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate Metrics
 
Instructor Manual Principles of Information Security, 7th Edition by Michael ...
Instructor Manual Principles of Information Security, 7th Edition by Michael ...Instructor Manual Principles of Information Security, 7th Edition by Michael ...
Instructor Manual Principles of Information Security, 7th Edition by Michael ...
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
 
The Three Dimensions of Security
The Three Dimensions of SecurityThe Three Dimensions of Security
The Three Dimensions of Security
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
Cmgt 400 entire course
Cmgt 400 entire courseCmgt 400 entire course
Cmgt 400 entire course
 
Domain 2 - Asset Security
Domain 2 - Asset SecurityDomain 2 - Asset Security
Domain 2 - Asset Security
 
R.a 1
R.a 1R.a 1
R.a 1
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
HIPAA compliance MA Healthcare scenario
HIPAA compliance MA Healthcare scenarioHIPAA compliance MA Healthcare scenario
HIPAA compliance MA Healthcare scenario
 
Cmgt 400 week 4 team assignment security policy and training
Cmgt 400 week 4 team assignment security policy and trainingCmgt 400 week 4 team assignment security policy and training
Cmgt 400 week 4 team assignment security policy and training
 

More from luellaj

Complete the following comparison table between managerial and finan.docx
Complete the following comparison table between managerial and finan.docxComplete the following comparison table between managerial and finan.docx
Complete the following comparison table between managerial and finan.docx
luellaj
 
Complete the following sentence stems....1. A special situat.docx
Complete the following sentence stems....1. A special situat.docxComplete the following sentence stems....1. A special situat.docx
Complete the following sentence stems....1. A special situat.docx
luellaj
 
Complete the following question in 400 words with in-text citations .docx
Complete the following question in 400 words with in-text citations .docxComplete the following question in 400 words with in-text citations .docx
Complete the following question in 400 words with in-text citations .docx
luellaj
 
Complete the following assignment in one MS word document Chapt.docx
Complete the following assignment in one MS word document Chapt.docxComplete the following assignment in one MS word document Chapt.docx
Complete the following assignment in one MS word document Chapt.docx
luellaj
 
Complete the following assignment in one MS word documentChap.docx
Complete the following assignment in one MS word documentChap.docxComplete the following assignment in one MS word documentChap.docx
Complete the following assignment in one MS word documentChap.docx
luellaj
 
Complete the following assignments in one MS word documentAns.docx
Complete the following assignments in one MS word documentAns.docxComplete the following assignments in one MS word documentAns.docx
Complete the following assignments in one MS word documentAns.docx
luellaj
 
Complete the following assignment in one MS word document C.docx
Complete the following assignment in one MS word document C.docxComplete the following assignment in one MS word document C.docx
Complete the following assignment in one MS word document C.docx
luellaj
 
Complete the following and submit for a gradeLab 1 Creating a .docx
Complete the following and submit for a gradeLab 1 Creating a .docxComplete the following and submit for a gradeLab 1 Creating a .docx
Complete the following and submit for a gradeLab 1 Creating a .docx
luellaj
 
Complete the final 6-page APA Multicultural Panel assignment, due at.docx
Complete the final 6-page APA Multicultural Panel assignment, due at.docxComplete the final 6-page APA Multicultural Panel assignment, due at.docx
Complete the final 6-page APA Multicultural Panel assignment, due at.docx
luellaj
 
Complete the external environmental scan for your organization (Xe.docx
Complete the external environmental scan for your organization (Xe.docxComplete the external environmental scan for your organization (Xe.docx
Complete the external environmental scan for your organization (Xe.docx
luellaj
 
Complete the eleven sections (Sections I-XI) of the Progress Monit.docx
Complete the eleven sections (Sections I-XI) of the Progress Monit.docxComplete the eleven sections (Sections I-XI) of the Progress Monit.docx
Complete the eleven sections (Sections I-XI) of the Progress Monit.docx
luellaj
 
Complete the Contract Plan Template to use a third party for the new.docx
Complete the Contract Plan Template to use a third party for the new.docxComplete the Contract Plan Template to use a third party for the new.docx
Complete the Contract Plan Template to use a third party for the new.docx
luellaj
 
Complete the conversation with the appropriate forms of the verbs in.docx
Complete the conversation with the appropriate forms of the verbs in.docxComplete the conversation with the appropriate forms of the verbs in.docx
Complete the conversation with the appropriate forms of the verbs in.docx
luellaj
 
Complete the Contributions to IO Psychology worksheet..docx
Complete the Contributions to IO Psychology worksheet..docxComplete the Contributions to IO Psychology worksheet..docx
Complete the Contributions to IO Psychology worksheet..docx
luellaj
 
Complete the Cardiovascular Exemplar Table in its entirety. .docx
Complete the Cardiovascular Exemplar Table in its entirety. .docxComplete the Cardiovascular Exemplar Table in its entirety. .docx
Complete the Cardiovascular Exemplar Table in its entirety. .docx
luellaj
 
Complete the attached Strategic Marketing Plan Template Part B.docx
Complete the attached Strategic Marketing Plan Template Part B.docxComplete the attached Strategic Marketing Plan Template Part B.docx
Complete the attached Strategic Marketing Plan Template Part B.docx
luellaj
 
Complete Section C Research Support.Develop a research base for.docx
Complete Section C Research Support.Develop a research base for.docxComplete Section C Research Support.Develop a research base for.docx
Complete Section C Research Support.Develop a research base for.docx
luellaj
 
Complete Table-1 (Joseph Farms, Inc., Cost and Revenue Data), either.docx
Complete Table-1 (Joseph Farms, Inc., Cost and Revenue Data), either.docxComplete Table-1 (Joseph Farms, Inc., Cost and Revenue Data), either.docx
Complete Table-1 (Joseph Farms, Inc., Cost and Revenue Data), either.docx
luellaj
 
Complete Problem Museum Gala on pg. 465-466.Complete Question.docx
Complete Problem Museum Gala on pg. 465-466.Complete Question.docxComplete Problem Museum Gala on pg. 465-466.Complete Question.docx
Complete Problem Museum Gala on pg. 465-466.Complete Question.docx
luellaj
 
Complete Plan (20) Prepare a 1300 word paper in which you recomme.docx
Complete Plan (20) Prepare a 1300 word paper in which you recomme.docxComplete Plan (20) Prepare a 1300 word paper in which you recomme.docx
Complete Plan (20) Prepare a 1300 word paper in which you recomme.docx
luellaj
 

More from luellaj (20)

Complete the following comparison table between managerial and finan.docx
Complete the following comparison table between managerial and finan.docxComplete the following comparison table between managerial and finan.docx
Complete the following comparison table between managerial and finan.docx
 
Complete the following sentence stems....1. A special situat.docx
Complete the following sentence stems....1. A special situat.docxComplete the following sentence stems....1. A special situat.docx
Complete the following sentence stems....1. A special situat.docx
 
Complete the following question in 400 words with in-text citations .docx
Complete the following question in 400 words with in-text citations .docxComplete the following question in 400 words with in-text citations .docx
Complete the following question in 400 words with in-text citations .docx
 
Complete the following assignment in one MS word document Chapt.docx
Complete the following assignment in one MS word document Chapt.docxComplete the following assignment in one MS word document Chapt.docx
Complete the following assignment in one MS word document Chapt.docx
 
Complete the following assignment in one MS word documentChap.docx
Complete the following assignment in one MS word documentChap.docxComplete the following assignment in one MS word documentChap.docx
Complete the following assignment in one MS word documentChap.docx
 
Complete the following assignments in one MS word documentAns.docx
Complete the following assignments in one MS word documentAns.docxComplete the following assignments in one MS word documentAns.docx
Complete the following assignments in one MS word documentAns.docx
 
Complete the following assignment in one MS word document C.docx
Complete the following assignment in one MS word document C.docxComplete the following assignment in one MS word document C.docx
Complete the following assignment in one MS word document C.docx
 
Complete the following and submit for a gradeLab 1 Creating a .docx
Complete the following and submit for a gradeLab 1 Creating a .docxComplete the following and submit for a gradeLab 1 Creating a .docx
Complete the following and submit for a gradeLab 1 Creating a .docx
 
Complete the final 6-page APA Multicultural Panel assignment, due at.docx
Complete the final 6-page APA Multicultural Panel assignment, due at.docxComplete the final 6-page APA Multicultural Panel assignment, due at.docx
Complete the final 6-page APA Multicultural Panel assignment, due at.docx
 
Complete the external environmental scan for your organization (Xe.docx
Complete the external environmental scan for your organization (Xe.docxComplete the external environmental scan for your organization (Xe.docx
Complete the external environmental scan for your organization (Xe.docx
 
Complete the eleven sections (Sections I-XI) of the Progress Monit.docx
Complete the eleven sections (Sections I-XI) of the Progress Monit.docxComplete the eleven sections (Sections I-XI) of the Progress Monit.docx
Complete the eleven sections (Sections I-XI) of the Progress Monit.docx
 
Complete the Contract Plan Template to use a third party for the new.docx
Complete the Contract Plan Template to use a third party for the new.docxComplete the Contract Plan Template to use a third party for the new.docx
Complete the Contract Plan Template to use a third party for the new.docx
 
Complete the conversation with the appropriate forms of the verbs in.docx
Complete the conversation with the appropriate forms of the verbs in.docxComplete the conversation with the appropriate forms of the verbs in.docx
Complete the conversation with the appropriate forms of the verbs in.docx
 
Complete the Contributions to IO Psychology worksheet..docx
Complete the Contributions to IO Psychology worksheet..docxComplete the Contributions to IO Psychology worksheet..docx
Complete the Contributions to IO Psychology worksheet..docx
 
Complete the Cardiovascular Exemplar Table in its entirety. .docx
Complete the Cardiovascular Exemplar Table in its entirety. .docxComplete the Cardiovascular Exemplar Table in its entirety. .docx
Complete the Cardiovascular Exemplar Table in its entirety. .docx
 
Complete the attached Strategic Marketing Plan Template Part B.docx
Complete the attached Strategic Marketing Plan Template Part B.docxComplete the attached Strategic Marketing Plan Template Part B.docx
Complete the attached Strategic Marketing Plan Template Part B.docx
 
Complete Section C Research Support.Develop a research base for.docx
Complete Section C Research Support.Develop a research base for.docxComplete Section C Research Support.Develop a research base for.docx
Complete Section C Research Support.Develop a research base for.docx
 
Complete Table-1 (Joseph Farms, Inc., Cost and Revenue Data), either.docx
Complete Table-1 (Joseph Farms, Inc., Cost and Revenue Data), either.docxComplete Table-1 (Joseph Farms, Inc., Cost and Revenue Data), either.docx
Complete Table-1 (Joseph Farms, Inc., Cost and Revenue Data), either.docx
 
Complete Problem Museum Gala on pg. 465-466.Complete Question.docx
Complete Problem Museum Gala on pg. 465-466.Complete Question.docxComplete Problem Museum Gala on pg. 465-466.Complete Question.docx
Complete Problem Museum Gala on pg. 465-466.Complete Question.docx
 
Complete Plan (20) Prepare a 1300 word paper in which you recomme.docx
Complete Plan (20) Prepare a 1300 word paper in which you recomme.docxComplete Plan (20) Prepare a 1300 word paper in which you recomme.docx
Complete Plan (20) Prepare a 1300 word paper in which you recomme.docx
 

Recently uploaded

Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 

Recently uploaded (20)

Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 

Complete each section of the worksheet using the textbooks and.docx

  • 1. Complete each section of the worksheet using the text book s and course materials provided in Week 2 . 1. The set of laws, rules, directives, and practices that regulate how an organization manages, protects, and distributes controlled information is called _______. 2. The security concept that states every user should be responsible for his or her own actions is called _______. 3. The individual who is responsible for deciding on the access rights to the information for various personnel is called an _______.
  • 2. 4. Physical, technical, and administrative controls used to protect information systems are called _______. 5. The probability that a particular threat will exploit a particular vulnerability of an information system is called _______. 6. An event, process, activity, or substance that has an adverse effect on organizational assets is called a _______. Federal Information Security Management Act (FISMA) of 2002
  • 3. Terminology Matching Match the terminology with the correct definition by inserting the corresponding letter in the answer column.
  • 5. Definitions 7. Authorize A. Information systems and internal information are grouped based on impact. 8. Supplement B. The step where an initial set of security controls for the information system are chosen and tailored to obtain a starting point for required controls 9.
  • 6. Monitor C. Assess the risk and local conditions, including the security requirements, specific threat information, and cost–benefit analysis to increase or decrease security controls. 10. Categorize D. Step where the original and supplement controls are put in writing 11. Document E. Original and supplement controls are applied to the system.
  • 7. 12. Select F. Security controls are evaluated to see if they are implemented correctly and are operating as intended. 13. Assess G. Evaluation of risk to organizational operations, organizational assets, or individuals that leads to this action 14. Implement
  • 8. H. Requires checking and assessing the selected security controls in the information system on a continuous basis