A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?
What controls can you do to protect sensitive data in your computer when you go out for lunch?
What is the name of the system that guarantees the coherence of information security in the organization?
-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.
Which of the following is a possible event that can have a disruptive effect on the reliability of information?
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
Which of the following factors does NOT contribute to the value of data for an organisation?