answersLogoWhite

0


Best Answer

governance framework in order to effectively implement security governance, the corporate governance task force( CGTF) recommends that organizations follow an established frameworks as the ideal framework,which is described in the document information security governance. Call to Action, define the responsibilities.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Where can a security administrator find information on established security frameworks?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Where can a security administrator find information on established security framework?

Information System Audit and Control Association (ISACA)


What is security key for Mysore ITI wireless network near SJCE college mysore?

WikiAnswers does not provide security or hacking information. Please contact the system administrator for information.


What are some career paths for AAS in information tech with a concentration in computer network systems?

Network administrator security+ administrator computer technical support support technician information technology specialist Help desk technician


When was Security Administrator Tool for Analyzing Networks created?

Security Administrator Tool for Analyzing Networks was created in 1995.


What is the role of a security administrator?

The role of a security administrator will have many roles in a company such as analyze vulnerability in the networks, manage periodic security reviews, and many others.


Who is responsible for database security?

Each database can have a security administrator who is in charge of enforcing and maintaining the database security policy. If the database system is small, the database administrator may also have security administrator responsibilities. To learn more about data science please visit- Learnbay.co


How IP accounting helps the administrator to analyze the security threats to a network?

how ip accounting helps the administrator to analyze security threats of a network?


Who should be held accountable when security is breached by a hacker?

The security officer or Administrator


To enhance information assurance and security what must work closely with the unit security manager to ensure investigative training requirements are met before granting new users a?

client support administrator


You are the network administrator for a new organization you are currently in the planning phase of setting up security logging for the network what is the purpose of security logging?

To record specified events and record further information regarding the events


What is established by Air Force Systems Security Instruction 5027 Network Security Policy?

The baseline security policy for Air Force base-level networks processing sensitive information


What information contained in the official phreaker manual might help a security administrator to protect a communications system?

For a security administrator it can be helpful in giving a better understanding of the principals involved in hacks themselves. It goes through and focuses in phones with explanations of key components from building your own blue box to central office operations.