- This summary
- +380.000 other summaries
- A unique study tool
- A rehearsal system for this summary
- Studycoaching with videos
A snapshot of the summary - Joris
Chapter 1 Security Aims and objectives
What are the three components of the CIA triad?
How can we control access of personnel to a data center?
1. Door security guards
3. Two door lock
Name three main control categories.
1. Managerial Controls
2. Operation Controls
4. Compensating control
Following an incident, what type of control will be used when researching how the incident happened?Technical control = Log Files CCTV IPDS IDS
How do I know whether the integrity of my data is intact?
What type of control is it when you change the firewall rules?Technical Control
What is used to log in to a system that works in conjunction with a PIN?Username and password
What is the name of the person who looks after classified data and who is the person that gives people access to the classified data?1. Security administrator
When you use a DAC model for access, who determines who gains access to the data?Security officer
The sales team are allowed to log in to the company system between 9 a.m. and 10 p.m. What type of access control is being used?Authorization