The ability to reasonably ensure conformity and adherence to organization policies, standards, procedures to laws and regulations is called ___.
COMPLIANCE
A deviation from a centrally supported and approved IT security standard and can come about because of a lack of preparedness by the organization to comply with a standard or due to the use of a technology that has not been sanctioned by the standards is called ___.
EXCEPTION
A capstone document that establishes the reporting lines and delegation of responsibilities for Information Security to management below the organization’s chief information officer (CIO) or other executive leader is called ___.
INFORMATION SECURITY PROGRAM CHARTER
Information security standards published by the ISO and by the International Electrotecnical Commission (IEC)
ISO/IEC 27000 SERIES
A standard that focuses on areas of current relevance and concern to an organization. This is used to express security control requirement, typically for non-technical processes and are used to guide human behavior is called ___.
ISSUE-SPECIFIC STANDARD
A logical structure that is established to organize policy documentation into groupings and categories that make it easier for employees to find and understand the contents of various policy documents is called ___.
IT POLICY FRAMEWORK
A publication for the US National Institute of standards and Technology (NIST) and is titled “Recommended Security controls for Federal Information Systems and Organizations is called ___.
NIST SP 800-53
A standard that focusses on specific technology or systems being used within an organization. These are used to express the security control implementation requirements for some specific technology is called ___.
SYSTEM-SPECIFIC STANDARD
ALL ANSWERS
Adoption of an information security policy framework or charter
COBIT
ISO/IEC 27002
NIST SP 800-53
TRUE
Policies
Guideline
Procedure
TRUE
Unauthorized persons or processes
Unauthorized access to and use of the system Unauthorized disclosure of information Disruption of the system Modification of information Destruction of information resources