Part 3 Flashcards

0
Q

TEN STEPS TO BUILDING A SECURE ORGANIZATION

Having identified some of the challenges to building a secure organization, let’s now look at 10 ways to successfully build a secure organization.
The following steps will put a business in a robust
____

A

security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Evaluate the ____

A

Risks and Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Another approach is to begin by evaluating the ____.

A

threats posed to your organization and your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threats Based on the Infrastructure Model

The first place to start is to ____ based on an organization’s infrastructure model.

A

identify risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What ____ is in place that is necessary to support the operational needs of the business?

A

infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A small business that operates out of one office has ___ as opposed to an organization that operates out of numerous facilities, includes a mobile workforce utilizing a variety of handheld devices, and offers products or services through a Web-based interface.

A

reduced risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An organization that has a large number of telecommuters must take steps to protect its ____ that could potentially reside on personally owned computers outside company control.

A

proprietary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An organization that has widely dispersed and disparate systems will have more ____ than a centrally located one that utilizes uniform systems.

A

risk potential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Threats Based on ____

Are there any specific threats for your particular business?

A

the Business Itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threats Based on ____

Businesses belonging to particular industries are targeted more frequently and with more dedication than those in other industries.

A

Industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Financial institutions and online retail- ers are targeted because ____

A

“that’s where the money is.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pharmaceutical manufacturers could be targeted to steal ____, but they also could be targeted by special interest groups, such as those that do not believe in testing drugs on live animals.

A

intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Global Threats

Businesses are often so narrowly focused on their local sphere of influence that they forget that by having a network connected to the Internet, they are now ____

A

connected to the rest of the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If a piece of malware identified on the other side of the globe targets the ____ used in your organization, you can be sure that you will eventually be impacted by this malware.

A

identical software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Once threats and risks are identified, you can take one of four steps:

Ignore the risk. This is never an acceptable response. This is simply burying your head in the sand and hoping the problem will go away—the business equivalent of _____

A

not wearing a helmet when riding a motorcycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_____ When the cost to remove the risk is greater than the risk itself, an organization will often decide to simply _____ This is a viable option as long as the organization has spent the time required to evaluate the risk.

A

Accept the risk.

16
Q

____ Organizations with limited staff or other resources could decide to ____. One method of ______ is to purchase specialized insurance targeted at a specific risk.

A

Transfer the risk.

17
Q

_____. Most organizations ______by applying the appropriate resources to minimize the risks posed to their network.

A

Mitigate the risk