A scenario wherein the city or location where the building(s) reside is / are not accessible.
Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.
Which of these examples is a threat to integrity?
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
The computer room is protected by a pass reader. Only the System Management department has a pass.
What type of security measure is this?
After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?
You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
In what part of the process to grant access to a system does the user present a token?
Which reliability aspect of information is compromised when a staff member denies having sent a message?
Does the security have the right to ask you to display your ID badges and check your bags?
CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as
You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.
What kind of threat is this?
A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?