Module 11: Security Policies and Laws Flashcards
Why are security policies important
It defines the rules of safeguards, which reduce the risk of personnel injury and property loss
TRUE or FALSE: A security policy helps preventing wastage of a company’s computing resources
TRUE
What are the key elements in a security policy
- Clear Communication
- Brief and Clear Information
- Defined Scope and Applicability
- Enforceable by Law
- Recognizes Areas of Responsibility
- Sufficient Guidance
- Top Management Involvement
Ultimately what do the security policy safeguard
The assets
What vital role does a security policy play
Improving the operational efficiency of an organizational
If an employee commits a violation why is it important to have a security policy
It becomes a point of reference
A good security policy has characteristics that are well defined for a clear understanding. What are some such characteristics
- Implemented and administered through proper channels
- Enforced through sanctions and security tools
- Defined areas of responsibility for users, admins, and management
- Documented, distributed, and communicated
When should a security policy be implemented
After building, revising, and updating of policy statements
TRUE or FALSE: The final security policy should be available to only the upper management and some parts of the organization where it will affect production
FALSE
It should be available to the whole organization
Where should the policy be available to the organization
The internal network
What is an Access Control Policy
It authorizes a group of users to perform a set of actions on a set of resources
TRUE or FALSE: Access Control Policy prevents unauthorized access through managed controls and creates a secure computing environment
TRUE
What are the elements of access control policy
- Access group (group of users to which the policy applies)
- Action group (group of actions performed by the user on resources)
- Resource group (resources controlled by the policy)
- Relationship (Resource class can have a set of relationships associated with it)
What is an Acceptable Use Policy
A policy that defines the proper use of computing resources
According to the Acceptable Use Policy what are the responsibility of the users
To protect the information available in their accounts
What is an Administrative Security Policy
It defines the security and protection requirements for information and information systems