Podcast
Questions and Answers
What is the ad hoc approach to implementing cybersecurity?
What is the ad hoc approach to implementing cybersecurity?
- Implementing security based on regulations or standards
- Implementing security with no particular rationale or criteria (correct)
- Implementing security based on scenario-based approach
- Identifying unique risks and designing security controls
What characterizes the compliance-based approach to cybersecurity implementation?
What characterizes the compliance-based approach to cybersecurity implementation?
- Implementing security based on scenario-based approach
- Implementing security based on regulations or standards (correct)
- Identifying unique risks and designing security controls
- Implementing security with no particular rationale or criteria
What distinguishes the risk-based approach to cybersecurity implementation?
What distinguishes the risk-based approach to cybersecurity implementation?
- Implementing security based on regulations or standards
- Implementing security with no particular rationale or criteria
- Identifying unique risks and designing security controls (correct)
- Implementing security based on scenario-based approach
What are the potential drawbacks of the ad hoc approach to cybersecurity implementation?
What are the potential drawbacks of the ad hoc approach to cybersecurity implementation?
What is a common issue associated with the compliance-based approach to cybersecurity implementation?
What is a common issue associated with the compliance-based approach to cybersecurity implementation?
What is a characteristic of the risk-based approach to cybersecurity implementation?
What is a characteristic of the risk-based approach to cybersecurity implementation?
What term is used to refer to other individuals or enterprises with whom information must be shared?
What term is used to refer to other individuals or enterprises with whom information must be shared?
Why is cybersecurity more difficult to control when third parties are involved?
Why is cybersecurity more difficult to control when third parties are involved?
What is a common consequence of outsourcing functions onshore and offshore?
What is a common consequence of outsourcing functions onshore and offshore?
Why can outsourced/offshored functions present risk from an information security point of view?
Why can outsourced/offshored functions present risk from an information security point of view?
What is a potential drawback of outsourcing functions from an information security perspective?
What is a potential drawback of outsourcing functions from an information security perspective?
Why does information sharing with third parties pose a risk to enterprises?
Why does information sharing with third parties pose a risk to enterprises?