Security administrators assure that computing systems work with the auditing mechanisms and are being protected from the excessive privileges.
Which of the following roles are responsible for assuring that third party suppliers and outsourced functions remain in security compliance?
15 Cards in this Set
Which of the following roles are responsible for assuring that third party suppliers and outsourced functions remain in security compliance? | Vendor managers |
---|---|
Who is responsible for assuring that systems are auditable and protected from excessive privileges? | Security administrators |
Which of the following are elements to protecting information?
Confidentiality, Integrity, and availability.
What is meant by the phrase the umbrella of information security?
The umbrella of information security means that InfoSec acts as an umbrella and is a discipline, which protects data and information and keeps them secure and confidential. Information and data can be kept confidential by using various disciplines and information security policies.
What are the five components of a security policy?
It relies on five major elements: confidentiality, integrity, availability, authenticity, and non-repudiation.
Which of the following represents the three goals of information security?
Principle 2: The Three Security Goals Are Confidentiality, Integrity, and Availability. All information security measures try to address at least one of three goals: Protect the confidentiality of data. Preserve the integrity of data.
The Early Indicators of an Insider Threat
- Poor Performance Appraisals. An employee might take a poor performance review very sourly. …
- Voicing Disagreement with Policies. …
- Disagreements with Coworkers. …
- Financial Distress. …
- Unexplained Financial Gain. …
- Odd Working Hours. …
- Unusual Overseas Travel. …
- Leaving the Company.
What are the eight principles of security?
The eight design principles are:
- Principle of Least Privilege. …
- Principle of Fail-Safe Defaults. …
- Principle of Economy of Mechanism. …
- Principle of Complete Mediation. …
- Principle of Open Design. …
- Principle of Separation of Privilege. …
- Principle of Least Common Mechanism. …
- Principle of Psychological Acceptability.
What are the four components of a complete organizational security policy?
To create a comprehensive security plan, you need the following items in place: security policy, standards, baselines, guidelines, and procedures.
What are the characteristics of confidential data?
What is confidential data?
- Social Security number.
- Phone numbers of friends/family/colleagues/students.
- Driver’s license numbers.
- Bank account numbers.
- Tax information.
- Passwords or passphrases.
- Home address or phone numbers.
- Employee ID number.