Lecture 12 Flashcards
What is social engineering?
A psychological manipulation technique used to trick people into giving away sensitive information.
What is Information Security Governance?
The strategic direction and risk management process to ensure security objectives are met.
What is the COBIT framework?
A governance framework that helps organizations manage IT risks and align IT with business objectives.
What are the four steps of the policy lifecycle?
Plan, Implement, Monitor, and Evaluate.
What is the difference between a policy and a guideline?
Policy is a mandatory rule, while guideline is a recommendation that is not enforced.
What are examples of security policies?
- Acceptable Use Policy
- Password Policy
- Data Protection Policy
- Incident Response Policy
What are the three principles of personnel security?
- Least Privilege
- Separation of Duties
- Limited reliance on key employees
What are key components of Business Continuity Planning (BCP)?
- Data backups
- Disaster recovery sites
- Key personnel replacement strategies
What is the main goal of Access Control?
To ensure only authorized users have access to sensitive information and systems.
What is IT Security Operations?
The continuous process of maintaining and protecting IT systems through monitoring, auditing, and response.