An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
Phishing is what type of Information Security Incident?
A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:
What is the goal of classification of information?
Which of the following statements are correct for Clean Desk Policy?
You have a hard copy of a customer design document that you want to dispose off. What would you do
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?
Which of the following does an Asset Register contain? (Choose two)
A member of staff denies sending a particular message.
Which reliability aspect of information is in danger here?