Podcast
Questions and Answers
Who is responsible for ensuring the effective implementation of the procedure?
Who is responsible for ensuring the effective implementation of the procedure?
- Human Resources Department
- Head of Departments
- All Bank Employees
- Information Security Department (correct)
What is a primary reason for employees to be aware of cyber security threats?
What is a primary reason for employees to be aware of cyber security threats?
- To enhance customer service
- To become a cyber resilient bank (correct)
- To ensure compliance with regulatory bodies
- To improve financial performance
Which group of individuals is included in the scope of this procedure?
Which group of individuals is included in the scope of this procedure?
- Only permanent employees
- Only contract employees
- Only the executive management
- All internal and external users (correct)
What is expected from users while using the Bank's IT assets?
What is expected from users while using the Bank's IT assets?
What is indicated as the weakest link in the cyber security chain?
What is indicated as the weakest link in the cyber security chain?
What must users do concerning legal obligations relevant to their role?
What must users do concerning legal obligations relevant to their role?
Who arranges for awareness of acceptable use of information and assets among employees?
Who arranges for awareness of acceptable use of information and assets among employees?
What is required from users regarding the Bank’s policies?
What is required from users regarding the Bank’s policies?
What must users ensure regarding their user ID and password?
What must users ensure regarding their user ID and password?
How should users handle the storage of the Bank's data?
How should users handle the storage of the Bank's data?
What action should users take if they notice unusual activity in the IT resources?
What action should users take if they notice unusual activity in the IT resources?
Which of the following is NOT a responsibility of users regarding IT assets?
Which of the following is NOT a responsibility of users regarding IT assets?
What is the primary consequence of unauthorized access to data?
What is the primary consequence of unauthorized access to data?
What should users do with their passwords to maintain security?
What should users do with their passwords to maintain security?
Which action is allowed under the acceptable use of IT resources policy?
Which action is allowed under the acceptable use of IT resources policy?
Which of the following statements about unauthorized device connection is true?
Which of the following statements about unauthorized device connection is true?
What is the primary purpose of providing Internet access on organization-owned devices?
What is the primary purpose of providing Internet access on organization-owned devices?
Which of the following is considered an unsuitable use of the bank's Internet connection?
Which of the following is considered an unsuitable use of the bank's Internet connection?
Which activity is explicitly prohibited while using the bank’s Internet connection?
Which activity is explicitly prohibited while using the bank’s Internet connection?
What must users do to gain access to the Internet at the bank?
What must users do to gain access to the Internet at the bank?
What is one restriction on the kind of content users can transmit over the Internet connection?
What is one restriction on the kind of content users can transmit over the Internet connection?
Which of the following actions is allowed when using the bank's Internet connection?
Which of the following actions is allowed when using the bank's Internet connection?
Which purpose cannot be served by the bank’s Internet connection?
Which purpose cannot be served by the bank’s Internet connection?
What should users avoid doing with network traffic while using the bank's Internet connection?
What should users avoid doing with network traffic while using the bank's Internet connection?
What is one of the responsibilities of an Authorized User regarding IT resources?
What is one of the responsibilities of an Authorized User regarding IT resources?
Which of the following actions constitute unacceptable use of IT resources?
Which of the following actions constitute unacceptable use of IT resources?
Which practice is encouraged to maintain desktop organization?
Which practice is encouraged to maintain desktop organization?
What must users avoid when using organizational IT resources?
What must users avoid when using organizational IT resources?
What is a recommended security practice for users connecting to public Wi-Fi?
What is a recommended security practice for users connecting to public Wi-Fi?
What is prohibited regarding the sharing of organizational IT assets?
What is prohibited regarding the sharing of organizational IT assets?
What should users do regarding security updates for their computing devices?
What should users do regarding security updates for their computing devices?
Which of the following is an example of acceptable use of IT resources?
Which of the following is an example of acceptable use of IT resources?
What is the effective date of the NMB Bank Limited's Acceptable Use of IT Resources procedure?
What is the effective date of the NMB Bank Limited's Acceptable Use of IT Resources procedure?
Which department is responsible for the Information Security Standard Procedures?
Which department is responsible for the Information Security Standard Procedures?
What does the abbreviation 'MFA' stand for in the context of IT security?
What does the abbreviation 'MFA' stand for in the context of IT security?
Who approved the Acceptable Use of IT Resources procedure?
Who approved the Acceptable Use of IT Resources procedure?
What section in the procedure specifically addresses unacceptable use?
What section in the procedure specifically addresses unacceptable use?
Which of the following is included under the scope of acceptable use?
Which of the following is included under the scope of acceptable use?
Which one of the following roles was not listed as a supporter in the approval log?
Which one of the following roles was not listed as a supporter in the approval log?
What is the total number of pages for the Acceptable Use of IT Resources procedure?
What is the total number of pages for the Acceptable Use of IT Resources procedure?
Which section details procedures around mobile devices?
Which section details procedures around mobile devices?
What does 'PII' refer to in the list of abbreviations?
What does 'PII' refer to in the list of abbreviations?
What procedure is listed under the responsibilities in the table of contents?
What procedure is listed under the responsibilities in the table of contents?
What is the purpose of the acceptable use procedure?
What is the purpose of the acceptable use procedure?
Which of the following is a key component of the Acceptable Use of IT Resources procedure?
Which of the following is a key component of the Acceptable Use of IT Resources procedure?
How often was the last review conducted according to the document?
How often was the last review conducted according to the document?
Study Notes
NMB Bank Limited - Information Security Standard Procedures
Acceptable Use of IT Resources
- Effective from 12th August 2024, Version 1.0, this document outlines the acceptable use of NMB Bank's IT assets.
- Applicable to all employees and external users accessing the bank's information systems and physical infrastructure.
Purpose
- Aims to protect information and IT assets from unauthorized use.
- Promotes awareness of cybersecurity threats, emphasizing the need for user vigilance in safeguarding data.
Responsibilities
- CISC: Executive owner responsible for reviewing and releasing the procedure.
- Information Security Department (ISD): Ensures effective implementation and user awareness about acceptable use.
- Head of Departments: Implement acceptable use guidelines for compliance within their teams.
- Users: Required to follow guidelines and protect bank's data and IT resources.
General Guidelines
- Users must act responsibly with IT assets and comply with security policies.
- Sharing or misuse of user IDs and passwords is prohibited.
- Laptop and sensitive information damage or loss is the user's liability.
- Users should report any suspicious activity to IS and IT departments immediately.
Internet Usage
- Internet access allowed primarily for job-related activities, including research and posting updates.
- Prohibited activities include accessing illegal content, using resources for personal profit, and circumventing security measures.
- Clean desktop policy: Users advised to organize files and save confidential information in designated folders.
Unacceptable Use Examples
- Unauthorized disclosure of information or resources.
- Dissemination of offensive or illegal content.
- Connecting unauthorized devices to the network or using unapproved networks.
- Using bank IT resources for unauthorized solicitations or advertisements.
- Accessing public Wi-Fi without VPN and not updating security tools.
Compliance
- Users are solely responsible for adhering to the procedures outlined for acceptable use.
- Non-compliance may lead to disciplinary actions as per bank policy.
Key Abbreviations
- CISC: Corporate Information Security Committee
- ISD: Information Security Department
- VPN: Virtual Private Network
- MFA: Multi Factor Authentication
- PII: Personal Identifiable Information
This document serves as a critical framework for ensuring security and compliance in the use of IT resources at NMB Bank.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers the information security standard procedures at NMB Bank Limited, specifically focusing on the acceptable use of IT resources. It highlights the procedures and guidelines necessary to ensure the proper handling of bank assets and information security. Familiarize yourself with the latest practices and amendments to reinforce compliance and security.