Deck 15: Information Security Privacy in E-HRM

ملء الشاشة (f)
exit full mode
سؤال
A giant network connecting virtually any device at home or work to the internet, resulting in a 'relationship between people-people, people-things, and things-things' is called:

A) e-HRM
B) cyber security
C) Internet of Things (IoT)
D) cloud computing
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
__________ have evolved from worms and viruses to more advanced and organized attacks with the emergence of deception technologies.

A) Cyber security
B) Cyberattacks
C) Cloud computing
D) User credentials
سؤال
______________ is the "management framework to initiate, implement and control information security within the organization".

A) Information Security Management System (ISMS)
B) Plan-Do-Check-Act (PDCA) Cycle
C) Internet of Things (IoT)
D) Distributed Denial of Service Attacks (DDoS)
سؤال
The __________________ is considered the best-known standard in providing requirements for an information security management system (ISMS).

A) ISO/IEC 27000 family
B) COBIT
C) NIST
D) ISO/IEC 27001
سؤال
ISO defines _________ as "a systematic approach to managing sensitive company information so that it remains secure.

A) ISMS
B) COBIT
C) NIST
D) ISO/IEC 27001
سؤال
______________ starts with asset identification which involves identifying all the information repositaries that need to be protected for running the business.

A) Management assessment
B) Risk assessment
C) Performance assessment
D) Electronic assessment
سؤال
__________ are the external agents which could act to malicious effects.

A) Vulnerabilities
B) Controls
C) Threats
D) Risks
سؤال
_________ are the internal weakness in the system, such as unpatched system.

A) Vulnerabilities
B) Controls
C) Threats
D) Risks
سؤال
Individual's expectation that one will use their personal data as intended and protect it from disclosure to unauthorized parties defines:

A) cyber security
B) user credentials
C) SOX
D) data privacy
سؤال
In order to protect the Personal Identity Information (PII), organizations implement ______________.

A) sensitive personal data
B) privacy framework
C) data protection laws
D) consumer protection laws
سؤال
Why is information security and privacy critically important to businesses?
سؤال
What is Information Security Management System?
سؤال
Explain the critical role of HR in protecting information security and privacy?
سؤال
List and discuss three of the common privacy principles included in the chapter.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/14
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Information Security Privacy in E-HRM
1
A giant network connecting virtually any device at home or work to the internet, resulting in a 'relationship between people-people, people-things, and things-things' is called:

A) e-HRM
B) cyber security
C) Internet of Things (IoT)
D) cloud computing
C
2
__________ have evolved from worms and viruses to more advanced and organized attacks with the emergence of deception technologies.

A) Cyber security
B) Cyberattacks
C) Cloud computing
D) User credentials
B
3
______________ is the "management framework to initiate, implement and control information security within the organization".

A) Information Security Management System (ISMS)
B) Plan-Do-Check-Act (PDCA) Cycle
C) Internet of Things (IoT)
D) Distributed Denial of Service Attacks (DDoS)
A
4
The __________________ is considered the best-known standard in providing requirements for an information security management system (ISMS).

A) ISO/IEC 27000 family
B) COBIT
C) NIST
D) ISO/IEC 27001
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
5
ISO defines _________ as "a systematic approach to managing sensitive company information so that it remains secure.

A) ISMS
B) COBIT
C) NIST
D) ISO/IEC 27001
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
6
______________ starts with asset identification which involves identifying all the information repositaries that need to be protected for running the business.

A) Management assessment
B) Risk assessment
C) Performance assessment
D) Electronic assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
7
__________ are the external agents which could act to malicious effects.

A) Vulnerabilities
B) Controls
C) Threats
D) Risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
8
_________ are the internal weakness in the system, such as unpatched system.

A) Vulnerabilities
B) Controls
C) Threats
D) Risks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
9
Individual's expectation that one will use their personal data as intended and protect it from disclosure to unauthorized parties defines:

A) cyber security
B) user credentials
C) SOX
D) data privacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
10
In order to protect the Personal Identity Information (PII), organizations implement ______________.

A) sensitive personal data
B) privacy framework
C) data protection laws
D) consumer protection laws
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
11
Why is information security and privacy critically important to businesses?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is Information Security Management System?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
13
Explain the critical role of HR in protecting information security and privacy?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
14
List and discuss three of the common privacy principles included in the chapter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.