IS3350 CHAPTER 13 Flashcards
This states the proper use of an organization’s information technology resources and is called ___?
ACCEPTABLE USE POLICY (AUP)
The process through which a user proves his or her identity to access an information technology resource is called ___?
AUTHENTICATION
A minimum level of behavior or action that must be met in order to comply with a governance document. These are often specified in standards and are called ___?
BASELINE
An organization’s governing body. It plans an organization’s strategic direction and is required by law to act with due care and in the best interests of the organization. This body is called ___?
BOARD OF DIRECTOR (BOD)
An organization’s senior information technology official. This role focuses on developing an organizations own IT resources. This position is called ___?
CHIEF INFORMATION OFFICER (CIO)
An organization’s senior information security official is called the ___?
CHIEF INFORMATION SECURITY OFFICER (CISO)
An organization’s most senior technology official. This role focuses on developing an organization’s technology products. This position is called ___?
CHIEF TECHNOLOGY OFFICER (CTO)
This/these states how data is to be destroyed when it reaches the end of its life cycle and is called ___?
DATA DESTRUCTION POLICIES
This/these states how data is to be controlled controlled throughout its life cycle and is called ___?
DATA RETENTION POLICIES
Recommended actions and operational guides to users, IT staff, operations staff, and others when a specific standard doesn’t apply is called ___?
GUIDELINES
Executive management’s responsibility to provide strategic direction, oversight, and accountability for an organization’s information and information systems resources is called ___?
INFORMATION SECURITY GOVERNANCE
How an organization manages its day-to-day security activities. It makes sure that the policies dictated by the executive management team as part of its governance function are properly implemented is called ____?
INFORMATION SECURITY MANAGEMENT
The day-to-day planning of a business is called ___?
OPERATIONAL PLANNING
An organization’s high-level statement of information security direction and goals. These are the highest level governance documents and are called ____?
POLICY
The detailed step-by-step tasks, or checklists, that should be performed to achieve a certain goal or task. These are the lowest level governance documents and called ___?
PROCEDURE