Podcast
Questions and Answers
Who is responsible for ensuring the effective implementation of the procedure?
Who is responsible for ensuring the effective implementation of the procedure?
What is a primary reason for employees to be aware of cyber security threats?
What is a primary reason for employees to be aware of cyber security threats?
Which group of individuals is included in the scope of this procedure?
Which group of individuals is included in the scope of this procedure?
What is expected from users while using the Bank's IT assets?
What is expected from users while using the Bank's IT assets?
Signup and view all the answers
What is indicated as the weakest link in the cyber security chain?
What is indicated as the weakest link in the cyber security chain?
Signup and view all the answers
What must users do concerning legal obligations relevant to their role?
What must users do concerning legal obligations relevant to their role?
Signup and view all the answers
Who arranges for awareness of acceptable use of information and assets among employees?
Who arranges for awareness of acceptable use of information and assets among employees?
Signup and view all the answers
What is required from users regarding the Bank’s policies?
What is required from users regarding the Bank’s policies?
Signup and view all the answers
What must users ensure regarding their user ID and password?
What must users ensure regarding their user ID and password?
Signup and view all the answers
How should users handle the storage of the Bank's data?
How should users handle the storage of the Bank's data?
Signup and view all the answers
What action should users take if they notice unusual activity in the IT resources?
What action should users take if they notice unusual activity in the IT resources?
Signup and view all the answers
Which of the following is NOT a responsibility of users regarding IT assets?
Which of the following is NOT a responsibility of users regarding IT assets?
Signup and view all the answers
What is the primary consequence of unauthorized access to data?
What is the primary consequence of unauthorized access to data?
Signup and view all the answers
What should users do with their passwords to maintain security?
What should users do with their passwords to maintain security?
Signup and view all the answers
Which action is allowed under the acceptable use of IT resources policy?
Which action is allowed under the acceptable use of IT resources policy?
Signup and view all the answers
Which of the following statements about unauthorized device connection is true?
Which of the following statements about unauthorized device connection is true?
Signup and view all the answers
What is the primary purpose of providing Internet access on organization-owned devices?
What is the primary purpose of providing Internet access on organization-owned devices?
Signup and view all the answers
Which of the following is considered an unsuitable use of the bank's Internet connection?
Which of the following is considered an unsuitable use of the bank's Internet connection?
Signup and view all the answers
Which activity is explicitly prohibited while using the bank’s Internet connection?
Which activity is explicitly prohibited while using the bank’s Internet connection?
Signup and view all the answers
What must users do to gain access to the Internet at the bank?
What must users do to gain access to the Internet at the bank?
Signup and view all the answers
What is one restriction on the kind of content users can transmit over the Internet connection?
What is one restriction on the kind of content users can transmit over the Internet connection?
Signup and view all the answers
Which of the following actions is allowed when using the bank's Internet connection?
Which of the following actions is allowed when using the bank's Internet connection?
Signup and view all the answers
Which purpose cannot be served by the bank’s Internet connection?
Which purpose cannot be served by the bank’s Internet connection?
Signup and view all the answers
What should users avoid doing with network traffic while using the bank's Internet connection?
What should users avoid doing with network traffic while using the bank's Internet connection?
Signup and view all the answers
What is one of the responsibilities of an Authorized User regarding IT resources?
What is one of the responsibilities of an Authorized User regarding IT resources?
Signup and view all the answers
Which of the following actions constitute unacceptable use of IT resources?
Which of the following actions constitute unacceptable use of IT resources?
Signup and view all the answers
Which practice is encouraged to maintain desktop organization?
Which practice is encouraged to maintain desktop organization?
Signup and view all the answers
What must users avoid when using organizational IT resources?
What must users avoid when using organizational IT resources?
Signup and view all the answers
What is a recommended security practice for users connecting to public Wi-Fi?
What is a recommended security practice for users connecting to public Wi-Fi?
Signup and view all the answers
What is prohibited regarding the sharing of organizational IT assets?
What is prohibited regarding the sharing of organizational IT assets?
Signup and view all the answers
What should users do regarding security updates for their computing devices?
What should users do regarding security updates for their computing devices?
Signup and view all the answers
Which of the following is an example of acceptable use of IT resources?
Which of the following is an example of acceptable use of IT resources?
Signup and view all the answers
What is the effective date of the NMB Bank Limited's Acceptable Use of IT Resources procedure?
What is the effective date of the NMB Bank Limited's Acceptable Use of IT Resources procedure?
Signup and view all the answers
Which department is responsible for the Information Security Standard Procedures?
Which department is responsible for the Information Security Standard Procedures?
Signup and view all the answers
What does the abbreviation 'MFA' stand for in the context of IT security?
What does the abbreviation 'MFA' stand for in the context of IT security?
Signup and view all the answers
Who approved the Acceptable Use of IT Resources procedure?
Who approved the Acceptable Use of IT Resources procedure?
Signup and view all the answers
What section in the procedure specifically addresses unacceptable use?
What section in the procedure specifically addresses unacceptable use?
Signup and view all the answers
Which of the following is included under the scope of acceptable use?
Which of the following is included under the scope of acceptable use?
Signup and view all the answers
Which one of the following roles was not listed as a supporter in the approval log?
Which one of the following roles was not listed as a supporter in the approval log?
Signup and view all the answers
What is the total number of pages for the Acceptable Use of IT Resources procedure?
What is the total number of pages for the Acceptable Use of IT Resources procedure?
Signup and view all the answers
Which section details procedures around mobile devices?
Which section details procedures around mobile devices?
Signup and view all the answers
What does 'PII' refer to in the list of abbreviations?
What does 'PII' refer to in the list of abbreviations?
Signup and view all the answers
What procedure is listed under the responsibilities in the table of contents?
What procedure is listed under the responsibilities in the table of contents?
Signup and view all the answers
What is the purpose of the acceptable use procedure?
What is the purpose of the acceptable use procedure?
Signup and view all the answers
Which of the following is a key component of the Acceptable Use of IT Resources procedure?
Which of the following is a key component of the Acceptable Use of IT Resources procedure?
Signup and view all the answers
How often was the last review conducted according to the document?
How often was the last review conducted according to the document?
Signup and view all the answers
Study Notes
NMB Bank Limited - Information Security Standard Procedures
Acceptable Use of IT Resources
- Effective from 12th August 2024, Version 1.0, this document outlines the acceptable use of NMB Bank's IT assets.
- Applicable to all employees and external users accessing the bank's information systems and physical infrastructure.
Purpose
- Aims to protect information and IT assets from unauthorized use.
- Promotes awareness of cybersecurity threats, emphasizing the need for user vigilance in safeguarding data.
Responsibilities
- CISC: Executive owner responsible for reviewing and releasing the procedure.
- Information Security Department (ISD): Ensures effective implementation and user awareness about acceptable use.
- Head of Departments: Implement acceptable use guidelines for compliance within their teams.
- Users: Required to follow guidelines and protect bank's data and IT resources.
General Guidelines
- Users must act responsibly with IT assets and comply with security policies.
- Sharing or misuse of user IDs and passwords is prohibited.
- Laptop and sensitive information damage or loss is the user's liability.
- Users should report any suspicious activity to IS and IT departments immediately.
Internet Usage
- Internet access allowed primarily for job-related activities, including research and posting updates.
- Prohibited activities include accessing illegal content, using resources for personal profit, and circumventing security measures.
- Clean desktop policy: Users advised to organize files and save confidential information in designated folders.
Unacceptable Use Examples
- Unauthorized disclosure of information or resources.
- Dissemination of offensive or illegal content.
- Connecting unauthorized devices to the network or using unapproved networks.
- Using bank IT resources for unauthorized solicitations or advertisements.
- Accessing public Wi-Fi without VPN and not updating security tools.
Compliance
- Users are solely responsible for adhering to the procedures outlined for acceptable use.
- Non-compliance may lead to disciplinary actions as per bank policy.
Key Abbreviations
- CISC: Corporate Information Security Committee
- ISD: Information Security Department
- VPN: Virtual Private Network
- MFA: Multi Factor Authentication
- PII: Personal Identifiable Information
This document serves as a critical framework for ensuring security and compliance in the use of IT resources at NMB Bank.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers the information security standard procedures at NMB Bank Limited, specifically focusing on the acceptable use of IT resources. It highlights the procedures and guidelines necessary to ensure the proper handling of bank assets and information security. Familiarize yourself with the latest practices and amendments to reinforce compliance and security.