Although it is impossible to eliminate all business risks, a good policy can reduce the likelihood of risk occurring or reduce its impact. A business must find a way to balance a number of competing drivers. Which of the following is not one of these drivers?
Blog
True or False? A risk is the likelihood or probability of an…
True or False? A risk is the likelihood or probability of an event and its impact.
You can implement a security awareness program in many ways….
You can implement a security awareness program in many ways. Which of the following is a generally accepted principle of security awareness that is most often associated with new hires?
True or False? A security awareness program should teach an…
True or False? A security awareness program should teach an employee where to go for help.
In 2018, a British Airways breach captured customers’ person…
In 2018, a British Airways breach captured customers’ personal and payment data, impacting about 500,000 customers. In 2019, Capital One experienced a large data breach in which an attacker gained access to more than 100 million accounts and credit card applications. Both cases resulted, at least in part, from a(n)__________failure.
True or False? Business liability insurance lowers the finan…
True or False? Business liability insurance lowers the financial loss to an organization in the event of an incident.
Security controls define __________you protect information….
Security controls define __________you protect information. Security policies should define __________you set the goal.
True or False? An acceptable use policy (AUP) is a formal wr…
True or False? An acceptable use policy (AUP) is a formal written policy describing employee behavior when using company computer and network systems.
Which of the following is least likely to protect digital as…
Which of the following is least likely to protect digital assets?
A __________would be a misconfiguration of a system that all…
A __________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a __________is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.