Written Lab 1

Description

Tiff Ayn mptwag
Ernesto Hata
Flashcards by Ernesto Hata, updated more than 1 year ago
Ernesto Hata
Created by Ernesto Hata almost 6 years ago
197
0

Resource summary

Question Answer
290820180330 1. Discuss and describe the CIA TRIAD. part 1 1. The CIA Triad is the combination of Confidentiality, integrity, and availability. Confidentiality is the concept of the measures medidas used to ensure the protection of the secrecy of data, information, or resources. Integrity is the concept of protecting the reliability confiança and correctness exatidão of data.
290820180330 1. Discuss and describe the CIA TRIAD. part 2 Availability is the concept that authorized subjects are granted timely and uninterrupted access to objects. The term CIA Triad is used to indicate the three key components of a security solution.
290820180330 2. What are the requirements to hold a person accountable for the actions of their user account ? The requirements of accountability are identification, authentication, authorization, and auditing. Each of these components needs to be legally supportable to truly hold someone accountable for their actions.
290820180350 3- describe the benefits of change control management. The benefits of change control management include preventing unwanted security reduction because of uncontrolled change, documenting and tracking rastrear of all alterations in the environment, standardization, conforming with security policy, and the ability to roll back changes in the event of an unwanted or unexpected outcome.
290820180350 4- What are the seven major steps or phrases in the implementation of a classification scheme ? part 1 (1) Identity the custodian, and define their responsibilities. (2) Specify the evaluation criteria of how the information will be classified and labeled. (3) Classifying label each resource. Although the owner conducts this step, a supervisor should review it. (4) Document any exceptions to the classification policy that are discovered, and integrate them into evaluation criteria.
290820180350 4- What are the seven major steps or phrases in the implementation of a classification scheme ? part 2 5) select the security control that will be applied to each classification level to provide the necessary level of protection. (6) Specify the procedures for declassifying resources and procedures for transfer. custodian a resource to an external entity. (7) Create an enterprise-wide awareness program instruct all personnel about the classification system.
290820182110 5. Name the six primary security roles as defined by (ISC)2 for CISSP. The six security roles are: - Senior management - IT/Security Staff - owner - custodian - operator / user - Bob auditor.
290820180420 6. What are the four components of a complete organizational security policy and their basics purpose ? The four components of a security policies are: policies, standards, guidelines, and procedures. Policies are broad security statements. Standards are definitions of hardware and software security compliance. Guidelines are used when there is not an appropriate procedure Procedures are detailed step-by-step instructions for performing work task in a secure manner.
Show full summary Hide full summary

Similar

Geometry Formulas (Perimeters)
PatrickNoonan
A-Level Physics: Course Overview
cian.buckley+1
Cognitive Psychology - Loftus and Palmer (1974)
Robyn Chamberlain
Prueba de Aptitud Académica - Lenguaje
Teresa Nadal
Organic Chemistry Functional Groups
linpubotwheeds
Maths GCSE - What to revise!
sallen
Rights and Responsibilities Flashcards - Edexcel GCSE Religious Studies Unit 8
nicolalennon12
Guia rápido: Bem-vindo a GoConqr
miminoma
Macbeth Essay Notes
Mel M
Computer science quiz
Ryan Barton
Core 1.3 Energy Generation, Storage and Use
T Andrews