Study material generic cover image

Summary Joris

- Joris
313 Flashcards & Notes
Scroll down to see the PDF preview!
  • This summary
  • +380.000 other summaries
  • A unique study tool
  • A rehearsal system for this summary
  • Studycoaching with videos
Remember faster, study better. Scientifically proven.
Trustpilot Logo

A snapshot of the summary - Joris

  • Chapter 1 Security Aims and objectives

  • What are the three components of the CIA triad?

    2. Integrity
    3. Availability
  • How can we control access of personnel to a data center?

    1. Door security guards
    2. Mantraps
    3. Two door lock
    4. Badges
  • Name three main control categories.

    1. Managerial Controls
    2. Operation Controls
    3.Deterrent controls
    4. Compensating control
  • Following an incident, what type of control will be used when researching how the incident happened?
    Technical control = Log Files CCTV IPDS IDS
  • How do I know whether the integrity of my data is intact?

    FIle Hashing
  • What type of control is it when you change the firewall rules?
    Technical Control
  • What is used to log in to a system that works in conjunction with a PIN?
    Username and password
  • What is the name of the person who looks after classified data and who is the person that gives people access to the classified data?
    1. Security administrator
  • When you use a DAC model for access, who determines who gains access to the data?
    Security officer
  • The sales team are allowed to log in to the company system between 9 a.m. and 10 p.m. What type of access control is being used?
Read the full summary
This summary. +380.000 other summaries. A unique study tool. A rehearsal system for this summary. Studycoaching with videos.