6.4 Protection Measures Flashcards
What is access rights to information
This is who is allowed to access what information
What are staff responsibilities for maintaining the security of information
Logging out of systems when away from the desk and not sharing usernames and passwords with others
What is disaster recovery
Creating a disaster recovery plan to implement in the event of a security breach, it is a documented procedure that should be followed to protect a businesses IT infrastructure
What is an information security risk assessment
Continually monitor the IT infrastructure of a business in order to discover, correct and prevent security problems
What is evaluation of the effectiveness of protection measures
To review the effectiveness of the protection measures implemented by a business to ensure that they are fit for purpose.
What is training of staff to handle information
Not divulging information to unauthorised people. Logging out of systems when not at desks and using privacy screens to ensure those who are not meant to see screens can’t see them