Section D Flashcards
WHAT IS A PLAN DO CHECK ACT LOOP
A CYBER SECURITY POLICY THAT WILL DEFINE WHO IS RESONSIBLE FOR ENFORICNG CYBER SECURITY
WHAT DO THE HEADINGS OF THE PCDA LOOP INCLUDE
PLAN - IDENTIFY OBJECTIVES AND SCOPE FOR ISMS
DO - IMPLEMENT THE ISMS POLICIES AND PROCEDURES
CHECK - MONITOR AND REVIEW THE ISMS OVER TIME
ACT - UPDATE THE ISMS BASED ON REVIEW
WHAT IS THE ISO/ISEC
IT’S A STANDARD THAT SETS STANDARDISED REQUIREMENTS ORGANISATIONS SHOULD MEET IN DEVELOPING INFORMATION SECURITY MANAGEMENT
WHAT IS THE INTERNET AND EMAIL POLICY
THIS IS A SET OF RULES THAT USERS MUST ADHERE TO WHEN USING THE ORGANISATION’S CONNECTION
WHAT DOES THE INTERNET POLICY INCLUDE
- USING THE INTERNET IN AN ACCEPTABLE WAY
- DON’T SEND DISCRIMINATORY, HARRASING OR THREATING MESSAGES/IMAGES
DONT VISIT SITES CONTAINING ILLEGAL WEBSITES E.G OBSCENE - DON’T USE INTERNET TO PREPETRATE ANY FORM OF FRAUD OR SOFTWARE OR MUSIC PIRACY
WHAT DOES THE EMAIL POLICY INCLUDE
- EMAILS SENT USING THE COMPANY EMAIL SYSTEM MUST NOT CONTAIN OFFENSIVE CONTENT
- DO NOT FORWARD USING COMPANY CONFIDENTIAL MESSAGES TO EXTERNAL LOCATIONS
- DO NOT USE THE COMPANY EMAIL SYSTEM FOR PERSONAL USES
WHAT IS THE SECURITY PROCEDURE
SECURITY POLICY WILL DEFINE RULES THAT MUST BE FOLLOWED TO ENSURE IT EQUIPMENT AND DATA IS SAFE
WHAT IS THE PASSWORD PROCEDURE
THE PASSWORD PROCEDURE DEFINES CERTAIN RULES THAT MUST BE FOLLOWED IN REGARD TO THE SETTING AND USE OF USER’S PASSWORD
WHAT IS THE STAFF RESPONSIBILITY POLICY
A SET OF RULES WHICH EMPLOYEES WILL HAVE TO FOLLOW TO TRY AND KEEP THE SYSTEM SECURE
WHAT DOES THE STAFF RESPONSIBILITY POLICY
- ENSURING ROOMS ARE LOCKED WHEN EMPTY AND ALARMS ARE SET OVERNIGHT
- STORING MOBILE EQUIPMENT IN SECURE LOCKED CABINETS
- NEVER LEAVING A DEVICE LOGGED IN WHEN AWAY FROM IT
- UPDATING SOFTWARE APPLICATIONS TO THE LATEST VERSION
WHAT ARE THE SECURITY IT TRAINING POLICIES
ORAGNISATIONS ARE RESPONSIBLE FOR ENSURING THAT STAFF ARE AWARE OF RELEVANT POLICIES
WHAT DOES THE SECURITY IT TRAINING POLICY INCLUDE