The Information Security Manager (ISM) at Smith Consultants Inc. introduces the following
measures to assure information security:
- The security requirements for the network are specified.
- A test environment is set up for the purpose of testing reports coming from the database.
- The various employee functions are assigned corresponding access rights.
- RFID access passes are introduced for the building.
Which one of these measures is not a technical measure?
Which one of the threats listed below can occur as a result of the absence of a physical measure?
A well executed risk analysis provides a great deal of useful information. A risk analysis has four
main objectives. What is not one of the four main objectives of a risk analysis?
Your company is in the news as a result of an unfortunate action by one of your employees. The
phones are ringing off the hook with customers wanting to cancel their contracts. What do we call
this type of damage?
You are the owner of the courier company SpeeDelivery. You employ a few people who, while waiting to make a delivery, can carry out other tasks. You notice, however, that they use this time
to send and read their private mail and surf the Internet. In legal terms, in which way can the use
of the Internet and e-mail facilities be best regulated?
You work for a flexible employer who doesnt mind if you work from home or on the road. You
regularly take copies of documents with you on a USB memory stick that is not secure. What are
the consequences for the reliability of the information if you leave your USB memory stick behind
on the train?