- This + 400k other summaries
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding

A snapshot of the summary - CISM Certified Information Security Manager Bundle
-
1 Becoming a CISM
This is a preview. There are 2 more flashcards available for chapter 1
Show more cards here -
How Many Domain are covered in CISMFour
-
Which Domain is describe in Chapter 2Information Security Governance
-
In which domain is Information Security Program Development and Management coveredDomain 3
-
2 Information Security Governance
This is a preview. There are 2 more flashcards available for chapter 2
Show more cards here -
Who is responsible for governance in a companyBoard of Directors
-
2.1 Introduction to information Security Governance
This is a preview. There are 3 more flashcards available for chapter 2.1
Show more cards here -
What is the purpose of Security GovernanceTo align the Security Program to the Business needs
-
What is a desired capability or end state, ideally expressed in achievable, measurable terms?Objectives
-
Data owners must provide a safe and secure environment to ensure confidentiality, integrity and availability of the transaction. This is an example of which information securityPolicy
-
What is assumed as a minimum security level throughout an organizationBaseline
-
Which of the following are likely to be
updated Mostfrequently Policy, Standards, ProceduresProcedures (policies and standards are more static) -
2.1.1 Reason for Security Governance
This is a preview. There are 1 more flashcards available for chapter 2.1.1
Show more cards here -
With which triangle could you understand the priority of the businessCIA
- Higher grades + faster learning
- Don't study anything twice
- 100% sure, 100% understanding