NMB Bank IT Resource Usage Standards
46 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Who is responsible for ensuring the effective implementation of the procedure?

  • Human Resources Department
  • Head of Departments
  • All Bank Employees
  • Information Security Department (correct)
  • What is a primary reason for employees to be aware of cyber security threats?

  • To enhance customer service
  • To become a cyber resilient bank (correct)
  • To ensure compliance with regulatory bodies
  • To improve financial performance
  • Which group of individuals is included in the scope of this procedure?

  • Only permanent employees
  • Only contract employees
  • Only the executive management
  • All internal and external users (correct)
  • What is expected from users while using the Bank's IT assets?

    <p>To familiarize themselves with organizational security policies</p> Signup and view all the answers

    What is indicated as the weakest link in the cyber security chain?

    <p>Human chain</p> Signup and view all the answers

    What must users do concerning legal obligations relevant to their role?

    <p>Be familiar and comply with the relevant obligations</p> Signup and view all the answers

    Who arranges for awareness of acceptable use of information and assets among employees?

    <p>Information Security Department</p> Signup and view all the answers

    What is required from users regarding the Bank’s policies?

    <p>Familiarize and comply with policies</p> Signup and view all the answers

    What must users ensure regarding their user ID and password?

    <p>They must keep it confidential and not allow others to use it.</p> Signup and view all the answers

    How should users handle the storage of the Bank's data?

    <p>Only on authorized equipment, devices, or platforms.</p> Signup and view all the answers

    What action should users take if they notice unusual activity in the IT resources?

    <p>Report it to the IS and IT Department immediately.</p> Signup and view all the answers

    Which of the following is NOT a responsibility of users regarding IT assets?

    <p>To switch off antivirus tools if they hinder productivity.</p> Signup and view all the answers

    What is the primary consequence of unauthorized access to data?

    <p>Possible termination and legal action against the user.</p> Signup and view all the answers

    What should users do with their passwords to maintain security?

    <p>Create strong passwords and never share them.</p> Signup and view all the answers

    Which action is allowed under the acceptable use of IT resources policy?

    <p>Following clear directions on the limits of their authority.</p> Signup and view all the answers

    Which of the following statements about unauthorized device connection is true?

    <p>Unauthorized devices may disrupt network security and must not be connected.</p> Signup and view all the answers

    What is the primary purpose of providing Internet access on organization-owned devices?

    <p>To access information relevant to the organization's business obligations</p> Signup and view all the answers

    Which of the following is considered an unsuitable use of the bank's Internet connection?

    <p>Transmission of pornographic materials</p> Signup and view all the answers

    Which activity is explicitly prohibited while using the bank’s Internet connection?

    <p>Performing work for personal profit without authorization</p> Signup and view all the answers

    What must users do to gain access to the Internet at the bank?

    <p>Fill out an Internet access form for IT Department approval</p> Signup and view all the answers

    What is one restriction on the kind of content users can transmit over the Internet connection?

    <p>Users cannot transmit illegal materials such as copyrighted content</p> Signup and view all the answers

    Which of the following actions is allowed when using the bank's Internet connection?

    <p>Purchasing necessary equipment for work purposes</p> Signup and view all the answers

    Which purpose cannot be served by the bank’s Internet connection?

    <p>Conducting personal business transactions</p> Signup and view all the answers

    What should users avoid doing with network traffic while using the bank's Internet connection?

    <p>Interception of network traffic without authorization</p> Signup and view all the answers

    What is one of the responsibilities of an Authorized User regarding IT resources?

    <p>To ensure compliance with established policies and procedures</p> Signup and view all the answers

    Which of the following actions constitute unacceptable use of IT resources?

    <p>Auto forwarding official emails to a personal email account</p> Signup and view all the answers

    Which practice is encouraged to maintain desktop organization?

    <p>Clearing unwanted files regularly and organizing confidential information</p> Signup and view all the answers

    What must users avoid when using organizational IT resources?

    <p>Connecting to unauthorized wireless networks while on a wired connection</p> Signup and view all the answers

    What is a recommended security practice for users connecting to public Wi-Fi?

    <p>Use a Virtual Private Network (VPN) for security</p> Signup and view all the answers

    What is prohibited regarding the sharing of organizational IT assets?

    <p>Providing access to family and friends</p> Signup and view all the answers

    What should users do regarding security updates for their computing devices?

    <p>Ensure that the latest security updates and antivirus tools are installed</p> Signup and view all the answers

    Which of the following is an example of acceptable use of IT resources?

    <p>Accessing organizational information as part of job responsibilities with approval</p> Signup and view all the answers

    What is the effective date of the NMB Bank Limited's Acceptable Use of IT Resources procedure?

    <p>12th Aug 2024</p> Signup and view all the answers

    Which department is responsible for the Information Security Standard Procedures?

    <p>Information Security Department</p> Signup and view all the answers

    What does the abbreviation 'MFA' stand for in the context of IT security?

    <p>Multi Factor Authentication</p> Signup and view all the answers

    Who approved the Acceptable Use of IT Resources procedure?

    <p>Sunil KC</p> Signup and view all the answers

    What section in the procedure specifically addresses unacceptable use?

    <p>5.11 Unacceptable Use</p> Signup and view all the answers

    Which of the following is included under the scope of acceptable use?

    <p>Access control procedures</p> Signup and view all the answers

    Which one of the following roles was not listed as a supporter in the approval log?

    <p>IT Technician</p> Signup and view all the answers

    What is the total number of pages for the Acceptable Use of IT Resources procedure?

    <p>12</p> Signup and view all the answers

    Which section details procedures around mobile devices?

    <p>5.3 Mobile Devices</p> Signup and view all the answers

    What does 'PII' refer to in the list of abbreviations?

    <p>Personal Identifiable Information</p> Signup and view all the answers

    What procedure is listed under the responsibilities in the table of contents?

    <p>Policy Compliance</p> Signup and view all the answers

    What is the purpose of the acceptable use procedure?

    <p>Provide rules for acceptable use of IT assets</p> Signup and view all the answers

    Which of the following is a key component of the Acceptable Use of IT Resources procedure?

    <p>Clear Desk and Clear Screen</p> Signup and view all the answers

    How often was the last review conducted according to the document?

    <p>It is a new release</p> Signup and view all the answers

    Study Notes

    NMB Bank Limited - Information Security Standard Procedures

    Acceptable Use of IT Resources

    • Effective from 12th August 2024, Version 1.0, this document outlines the acceptable use of NMB Bank's IT assets.
    • Applicable to all employees and external users accessing the bank's information systems and physical infrastructure.

    Purpose

    • Aims to protect information and IT assets from unauthorized use.
    • Promotes awareness of cybersecurity threats, emphasizing the need for user vigilance in safeguarding data.

    Responsibilities

    • CISC: Executive owner responsible for reviewing and releasing the procedure.
    • Information Security Department (ISD): Ensures effective implementation and user awareness about acceptable use.
    • Head of Departments: Implement acceptable use guidelines for compliance within their teams.
    • Users: Required to follow guidelines and protect bank's data and IT resources.

    General Guidelines

    • Users must act responsibly with IT assets and comply with security policies.
    • Sharing or misuse of user IDs and passwords is prohibited.
    • Laptop and sensitive information damage or loss is the user's liability.
    • Users should report any suspicious activity to IS and IT departments immediately.

    Internet Usage

    • Internet access allowed primarily for job-related activities, including research and posting updates.
    • Prohibited activities include accessing illegal content, using resources for personal profit, and circumventing security measures.
    • Clean desktop policy: Users advised to organize files and save confidential information in designated folders.

    Unacceptable Use Examples

    • Unauthorized disclosure of information or resources.
    • Dissemination of offensive or illegal content.
    • Connecting unauthorized devices to the network or using unapproved networks.
    • Using bank IT resources for unauthorized solicitations or advertisements.
    • Accessing public Wi-Fi without VPN and not updating security tools.

    Compliance

    • Users are solely responsible for adhering to the procedures outlined for acceptable use.
    • Non-compliance may lead to disciplinary actions as per bank policy.

    Key Abbreviations

    • CISC: Corporate Information Security Committee
    • ISD: Information Security Department
    • VPN: Virtual Private Network
    • MFA: Multi Factor Authentication
    • PII: Personal Identifiable Information

    This document serves as a critical framework for ensuring security and compliance in the use of IT resources at NMB Bank.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the information security standard procedures at NMB Bank Limited, specifically focusing on the acceptable use of IT resources. It highlights the procedures and guidelines necessary to ensure the proper handling of bank assets and information security. Familiarize yourself with the latest practices and amendments to reinforce compliance and security.

    More Like This

    Use Quizgecko on...
    Browser
    Browser