Sie sind auf Seite 1von 1

Information Security & Audit

1. What is information security and how is it achieved?


2. What are the core principles of information security?
3. What is a security policy and why do we need one?
4. What is the difference between logical and physical security? Can you give an example of both?
4. What are the most common types of attack that threaten enterprise data security?
5. What is the difference between a threat and vulnerability?
6. What is a security control?
7. What are the different types of security control?
8. What is incident management?
9. What is business continuity management? How does it relate to security?
10. What is an IT security audit?
11. What is the difference between authentication and authorization?
12. What is a firewall?
13. What are the layers of the OSI model?
14. What information security challenges are faced in a cloud computing environment?
15. The typical responsibilities of a Chief Security Officer (CSO)?
16. In your opinion, what are the top five information securities threats facing an organization such as ours?
17. What is Sensitive Data?
18. Why Data Needs Protecting?
19. How Is Data Exposed?
20. Define security Policy and write the goals of security policy?
21. What are the characteristics of good security policies?
22. Write the Structure Security Policy.
23. How we can protect of computer from virus infection?
24. Explain Security Policy for Access Control.
25. What are the different methods for Computer Viruses Detection and Removal?
26 .Write are the Security Policy for Database.
27. Write a note on Information Systems Audit Policy.
28. What are the sources of threats to information systems?
29. Why cyber attacks have been on the rise?
30.What is Packet Sniffing,
31. What are the benefits of ISMS?

Das könnte Ihnen auch gefallen