Matching
Match each item with an statement below:
Premises:
never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
defines what actions the users of a system may perform while using the wireless network.
probability that a risk will occur in a particular year.
final step in identifying risks.
the lifeblood of an organization.
encourage members of professional groups to adhere to strict ethical behavior within their profession.
document that outlines the specific rules that must be met in order to keep the WLAN secure.
a valuable tool used in threat modeling.
proportion of an asset's value that is likely to be destroyed by a particular risk.
Responses:
Exposure Factor (EF)
Attack tree
Acceptable use policy (AUP)
Annualized Rate of Occurrence (ARO)
Security policy
Code of ethics
Risk assessment
Data
Security policy cycle
Correct Answer:
Premises:
Responses:
never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
defines what actions the users of a system may perform while using the wireless network.
probability that a risk will occur in a particular year.
final step in identifying risks.
the lifeblood of an organization.
encourage members of professional groups to adhere to strict ethical behavior within their profession.
document that outlines the specific rules that must be met in order to keep the WLAN secure.
a valuable tool used in threat modeling.
proportion of an asset's value that is likely to be destroyed by a particular risk.
Premises:
never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
defines what actions the users of a system may perform while using the wireless network.
probability that a risk will occur in a particular year.
final step in identifying risks.
the lifeblood of an organization.
encourage members of professional groups to adhere to strict ethical behavior within their profession.
document that outlines the specific rules that must be met in order to keep the WLAN secure.
a valuable tool used in threat modeling.
proportion of an asset's value that is likely to be destroyed by a particular risk.
Responses:
Related Questions
Q14: Briefly describe the areas that should be
Q15: Many organizations now enforce a(n) _ policy
Q16: What are the layers of information security?
Q17: What are the three models of trust?
Q18: The SLE is computed by multiplying the
Q20: The best approach to creating a security
Q21: A _ is a collection of suggestions
Q22: What are the characteristics of a policy?
Q23: A(n) _ is a document or series
Q24: Identifying assets is a fairly simple and