What type of compliancy standard, regulation or legislation provides a code of practice for information security?
The following are the guidelines to protect your password, except:
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
Which of the following is a possible event that can have a disruptive effect on the reliability of information?
What is we do in ACT - From PDCA cycle
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
What is the security management term for establishing whether someone's identity is correct?
In which order is an Information Security Management System set up?
There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer.
What are the consequences of this to the reliability of the information?
You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.
What kind of threat is this?
What is the worst possible action that an employee may receive for sharing his or her password or access with others?
Stages of Information
Integrity of data means
What type of system ensures a coherent Information Security organisation?
Which is the glue that ties the triad together