Written Lab 1

Description

Tiff Ayn mptwag
Ernesto Hata
Flashcards by Ernesto Hata, updated more than 1 year ago
Ernesto Hata
Created by Ernesto Hata almost 6 years ago
195
0

Resource summary

Question Answer
290820180330 1. Discuss and describe the CIA TRIAD. part 1 1. The CIA Triad is the combination of Confidentiality, integrity, and availability. Confidentiality is the concept of the measures medidas used to ensure the protection of the secrecy of data, information, or resources. Integrity is the concept of protecting the reliability confiança and correctness exatidão of data.
290820180330 1. Discuss and describe the CIA TRIAD. part 2 Availability is the concept that authorized subjects are granted timely and uninterrupted access to objects. The term CIA Triad is used to indicate the three key components of a security solution.
290820180330 2. What are the requirements to hold a person accountable for the actions of their user account ? The requirements of accountability are identification, authentication, authorization, and auditing. Each of these components needs to be legally supportable to truly hold someone accountable for their actions.
290820180350 3- describe the benefits of change control management. The benefits of change control management include preventing unwanted security reduction because of uncontrolled change, documenting and tracking rastrear of all alterations in the environment, standardization, conforming with security policy, and the ability to roll back changes in the event of an unwanted or unexpected outcome.
290820180350 4- What are the seven major steps or phrases in the implementation of a classification scheme ? part 1 (1) Identity the custodian, and define their responsibilities. (2) Specify the evaluation criteria of how the information will be classified and labeled. (3) Classifying label each resource. Although the owner conducts this step, a supervisor should review it. (4) Document any exceptions to the classification policy that are discovered, and integrate them into evaluation criteria.
290820180350 4- What are the seven major steps or phrases in the implementation of a classification scheme ? part 2 5) select the security control that will be applied to each classification level to provide the necessary level of protection. (6) Specify the procedures for declassifying resources and procedures for transfer. custodian a resource to an external entity. (7) Create an enterprise-wide awareness program instruct all personnel about the classification system.
290820182110 5. Name the six primary security roles as defined by (ISC)2 for CISSP. The six security roles are: - Senior management - IT/Security Staff - owner - custodian - operator / user - Bob auditor.
290820180420 6. What are the four components of a complete organizational security policy and their basics purpose ? The four components of a security policies are: policies, standards, guidelines, and procedures. Policies are broad security statements. Standards are definitions of hardware and software security compliance. Guidelines are used when there is not an appropriate procedure Procedures are detailed step-by-step instructions for performing work task in a secure manner.
Show full summary Hide full summary

Similar

B1 Biology
Emily Needham
GCSE Music (Edexcel) Quiz
corelledavis
Religious Language
michellelung2008
Economics - unit 1
Amardeep Kumar
GCSE REVISION TIMETABLE
TheJileyProducti
Key Terms - Religion and community cohesion
jackson.r08
Chemistry 2
Peter Hoskins
Aggregate Supply, Macroeconomic Equilibrium, The Economic Cycle, Economic Growth, Circular Flow and Measuring National Income
Hannah Nad
Study timetables importance
elena navarro
2PR101 1.test - 4. část
Nikola Truong
SalesForce ADM 201 Study Quiz
Brianne Wright