• The ________ is the individual primarily responsible for the assessment, management, and implementation of information security in the organization. • The protection of tangible items, objects, or areas from unauthorized access and misuse is known as ___________.