Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. True or False: The person responsible for the storage, maintenance, and prote

ID: 3661827 • Letter: 1

Question

1. True or False: The person responsible for the storage, maintenance, and protection of the information is the data custodian.

2. Information security has more to do with _______ than with ______.

3. The characteristic of information that deals with preventing disclosure is ________.

4. True or False: Information security programs that begin at a grassroots level by system administrators to improve security are often called a bottom-up approach.

5. True or False: Personal security addresses the issues needed to protect items, objects, or areas.

6. A formal approach to solving a problem based on a structured sequence of procedures is called a(n) ______.

7. _______ security encompasses the protection of an organization's communications media, technology, and content.

8. True or False: Many organizations find that their most valuable asset is their data.

9. A senior executive who promotes an information security project and ensures its support, both financially and administratively, at the highest levels of the organization is called a(n) _______.

10. Which SecSDLC phase keeps the security systems in a high state of readiness? ______

Explanation / Answer

1. True or False: The person responsible for the storage, maintenance, and protection of the
information is the data custodian. True

2. Information security has more to do with _______ than with ______. management, technology

3. The characteristic of information that deals with preventing disclosure is ________. confidentiality

4. True or False: Information security programs that begin at a grassroots level by system
administrators to improve security are often called a bottom-up approach. True

5. True or False: Personal security addresses the issues needed to protect items, objects, or
areas. False

6. A formal approach to solving a problem based on a structured sequence of procedures is
called a(n) ______. SDLC methodology

7. _______ security encompasses the protection of an organization's communications media,
technology, and content. communications security

8. True or False: Many organizations find that their most valuable asset is their data. True

9. A senior executive who promotes an information security project and ensures its support,
both financially and administratively, at the highest levels of the organization is called
a(n) _______. champion

10. Which SecSDLC phase keeps the security systems in a high state of readiness? ______ maintenance and change