The Daily Insight

Connected.Informed.Engaged.

news

Which is a valid type of role when it comes to data ownership?

Written by Sophia Koch — 0 Views

Which of the following is a valid type of role when it comes to data ownership? A data custodian works directly with data owners and is responsible for the storage, maintenance, and protection of the information.

Which of the following acts is also widely known as the Gramm Leach Bliley Act?

The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.

What are the properties of a secure information processing system?

What are the properties of a secure information processing system? Confidentiality, Integrity, and Availability (and Non-repudiation).

Which of the following phases of the SDLC is often considered the longest and most expensive phase of system development life cycle?

The implementation phase is the longest and most expensive phase of the systems development life cycle (SDLC).

What are the 3 roles of information security?

Information security is based on three main aspects of data security, frequently referred to as the CIA- namely confidentiality, integrity, and availability.

What is RA 10173 all about?

[REPUBLIC ACT NO. 10173] AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES.

What is the main purpose of the Gramm-Leach-Bliley Act quizlet?

The GLBA’s purpose was to remove legal barriers preventing financial institutions from providing banking, investment and insurance services together.

What is the Gramm-Leach-Bliley Act quizlet?

Gramm-Leach-Bliley Act. ensure that financial institutions, including mortgage brokers and lenders, protect nonpublic personal information of consumers.

Which are three key rules of the GLBA?

As part of your GLBA compliance requirement, you are required to meet the three sections of the Act. These sections include The Financial Rule, The Safeguards Rule, and The Pretexting Provisions.

What are the four elements of security?

An effective security system comprises of four elements: Protection, Detection, Verification & Reaction.

What are the three primary aspects of information security risk management?

The fundamental principles (tenets) of information security are confidentiality, integrity, and availability. Every element of an information security program (and every security control put in place by an entity) should be designed to achieve one or more of these principles.

Which are the different types of security attacks?

Top 10 Common Types of Cybersecurity Attacks
Malware. The term “malware” encompasses various types of attacks including spyware, viruses, and worms. Phishing. Man-in-the-Middle (MitM) Attacks. Denial-of-Service (DOS) Attack. SQL Injections. Zero-day Exploit. Password Attack. Cross-site Scripting.

What are the requirements for a policy to become enforceable?

The requirements for a policy to become enforceable are distribution, evaluation, comprehension, consistency and compliance.

What type of security was dominant in the early years of computing?

What type of security was dominant in the early years of computing? Physical security ONLY. What are the three components of the C.I.A. triangle?

What is a security role?

A security role is a collection of project-level privileges that are assigned to users and groups. A security role is a collection of privileges in a project. Those privileges are assigned as a set to various users or groups, on a project-by-project basis.

What is the end users role in IT security?

End users are responsible for protecting the information resources to which they have access. Their responsibilities cover both computerized and non-computerized information and information technology devices (paper, reports, books, film, recordings, computers, removable storage media, printers, phones, etc.)