A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:
A property of Information that has the ability to prove occurrence of a claimed event.
As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?
Which of the following factors does NOT contribute to the value of data for an organisation?
A scenario wherein the city or location where the building(s) reside is / are not accessible.
You are the lead auditor of the courier company SpeeDelivery. You have carried out a risk analysis and now want to determine your risk strategy. You decide to take measures for the large risks but not for the small risks.
What is this risk strategy called?
What controls can you do to protect sensitive data in your computer when you go out for lunch?
A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives.
What is not one of the four main objectives of a risk analysis?
A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work.
Where in the incident cycle is moving to a stand-by arrangements found?
__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as
A hacker gains access to a webserver and can view a file on the server containing credit card numbers.
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
An administration office is going to determine the dangers to which it is exposed.
What do we call a possible event that can have a disruptive effect on the reliability of information?
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.