Explain how risk management procedures are expressed.
What will be an ideal response?
These procedures are expressed as explicit behaviors that are referenced to the findings from the risk assessment and are normally captured in a set of control statements. The implementation of the control statements is normally done in priority order. Over time, the organization implements, evaluates, and fine-tunes the control set. Alterations to the control set are based on ongoing evaluations of the performance of each individual control.
You might also like to view...
Which of the following is NOT an issue-specific policy?
A. Email retention policy B. Auditing policy C. File server logout policy D. Acceptable use policy E. Statements a, b, and c only F. Statements a, c, and d only G. All the statements
You can password-protect workbooks using the General Options dialog box.
Answer the following statement true (T) or false (F)
Case WDX 5-1Brad works in the Human Resources department of a large corporation. His supervisor asked him to create a form for new employees to complete during orientation. Brad wants to link the form to an Access database so that he can compile the data. What is the first step he should take?
A. Follow the steps in the Link Text Wizard B. In Access, click the Link to the data source by creating a linked table option C. Save form data as a delimited text file D. Open a new blank database in Access
Match each item with a statement below.
A. A technology that developers can use to display HTML documents to users on the fly B. The attacker supplies SQL commands when prompted to fill in a Web application field C. Standard database access method developed by the SQL Access Group and allows interoperability between back-end DBMSs D. Open-source server-side scripting language that runs on a server and enables Web developers to create dynamic Web pages E. The interface that determines how a Web server passes data to a Web browser F. A pointer to the physical directory G. The analysis of a running application for vulnerabilities H. Ability to vary the information that is displayed on the Web page I. Displays the same information on the Web page regardless of who accesses the page J. Analysis of an application's source code for vulnerabilities