Question: Use Table 2 . 6 to conduct a security self - assessment. Identify specific follow - up actions you need to take.ure 2 . 6

Use Table 2.6 to conduct a security self-assessment. Identify specific follow-up actions you need to take.ure 2.6 An Organizational Security Dashboard
\table[[Organizational Security Dashboard],[#,Key performance indicator,Goal,Actual,Status],[1,Number of separation-of-duty violations,0,2,Red],[2,Number of users with weak, noncompliant passwords,5,4,Green],[3,Percentage of critical IT assets that passed penetration tests,>96%,93%,Yellow],[4,Backlog of software security patches and updates,3,3,Green],[5,Number of days since last intemal security audit,90,94,Yellow],[6,Number of days since last extemal security audit,366,384,Red],[7,Percentage of employees and contractors who passed security exam,>95%,87%,Red],[8,Score on last disaster-recovery test,>90%,93%,Green]]
Red - Immediate action required
Yellow - Caution, should be monitored
Green - OK, goal has been met
 Use Table 2.6 to conduct a security self-assessment. Identify specific follow-up

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!