GOVERNANCE - Information security strategy objectives - Desired state
4 important questions on GOVERNANCE - Information security strategy objectives - Desired state
What is meant by "desired state"
What is the COBIT 5 Process Assessment Tool (PAM)?
Where does EISA stand for
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
Which models can be used to define the desired state of security?
- COBIT5
- Open Group Architecture Framework (TOGAF)
- Zachman Enterprise Architecture Framework
- Extended Enterprise Architecture Framework (E2AF)
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding