ch04.csv

Card Set Information

Author:
geggart
ID:
258708
Filename:
ch04.csv
Updated:
2014-01-27 18:52:09
Tags:
BAKER ITS305 Management Information Security Chap
Folders:

Description:
BAKER ITS305 Management of Information Security Chap 4
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user geggart on FreezingBlue Flashcards. What would you like to do?


  1. access control lists (ACLs)
    "Specifications of authorization that govern the rights and privileges of users to a particular information asset. Includes user access lists
  2. enterprise information security policy (EISP)
    "The high- level information security policy (also known as a security program policy
  3. guidelines
    "Non-mandatory recommendations that the employee may use as a reference in complying with a policy. If the policy states Use strong passwords
  4. information security policies
    "Written instructions
  5. issue- specific security policy (ISSP)
    "An organizational policy that provides detailed
  6. practices
    "Example or sample actions illustrating compliance with policies. If the policy states Use strong passwords
  7. procedures
    "Step- by-step instructions designed to assist employees in following policies
  8. standard
    "A detailed statement of what must be done to comply with policy
  9. system- specific security policies (SysSPs)
    "Organizational policies that often function as standards or procedures to be used when configuring or maintaining systems. SysSPs can be separated into two general groups

What would you like to do?

Home > Flashcards > Print Preview