Lecture 3-2 Flashcards
Fill in the blank: A _______ is a series of detailed steps to be followed for accomplishing a particular task.
procedure
What is the role of user permissions in the CIA Triad?
They uphold Confidentiality.
What is an example of a technical control?
Firewalls or anti-virus software.
What outcome is achieved by implementing security controls?
Security function outcomes.
What does the term ‘asset discovery’ refer to?
Identifying the owned assets within an organization.
Fill in the blank: A standard can be used as a _______ document for implementing a policy.
reference
Name one regulatory framework that applies to personal data in Canada.
PIPEDA.
Name this: Examples include strong password recommendations and OS hardening.
Security Guidelines