Premium Essay

Is4550 Final Exam

In:

Submitted By keydoszius
Words 867
Pages 4
* -------------------------------------------------
Why are information security policies important to an organization?
-------------------------------------------------
They strengthen the company's ability to protect its information resources * -------------------------------------------------
Which of the following should include any business process re-engineering function?
-------------------------------------------------
Security review * -------------------------------------------------
Policies and procedures differ, because policies are ___ and procedures are ___.
-------------------------------------------------
Requirements, technical * -------------------------------------------------
Among other things, security awareness programs must emphasize value, culture, and ___.
-------------------------------------------------
Resiliency * -------------------------------------------------
To achieve repeatable behavior of policies, you must measure both ___ and ___.
-------------------------------------------------
Consistency, quality * -------------------------------------------------
Within the user domain, some of the ways in which risk can be mitigated include: awareness, enforcement, and ___.
-------------------------------------------------
reward * -------------------------------------------------
In a workstation domain, you can reduce risk by ___.
-------------------------------------------------
Securing the workstation * -------------------------------------------------
How is risk reduced in the LAN-to-WAN domain?
-------------------------------------------------
Setting up rules in the DMZ * -------------------------------------------------
The basic elements of motivation include pride, success, and ____.
-------------------------------------------------
Self-interest *

Similar Documents

Premium Essay

Informative

...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing...

Words: 18421 - Pages: 74

Premium Essay

Test

...NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10