What is the difference between a restricted and confidential document?
A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.
Which of these examples is a threat to integrity?
Stages of Information
What is the purpose of an Information Security policy?
Which of the following does an Asset Register contain? (Choose two)
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
Which of the following factors does NOT contribute to the value of data for an organisation?
In acceptable use of Information Assets, which is the best practice?