CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 57

The ____ illustrates the most critical characteristics of information and has been the industry standard for computer security since the development of the mainframe. • Question 42 ____ is the process of examining, documenting, and assessing the security posture of an organization’s information technology and the risks it faces. • Question 43 A CSIRT model that is effective for large organizations and for organizations with major computing resources at distant locations is the ____. • Question 44 The CSIRT should be available for contact by anyone who discovers or suspects that an incident involving the organization has occurred. Some organizations prefer that employees contact a ____, which then makes the determination as to whether to contact the CSIRT or not.