Cybersecurity Risk and Implementation Approaches Quiz
12 Questions
1 Views
3.5 Stars

Cybersecurity Risk and Implementation Approaches Quiz

Created by
@ThrilledEpic

Questions and Answers

What is the ad hoc approach to implementing cybersecurity?

Implementing security with no particular rationale or criteria

What characterizes the compliance-based approach to cybersecurity implementation?

Implementing security based on regulations or standards

What distinguishes the risk-based approach to cybersecurity implementation?

Identifying unique risks and designing security controls

What are the potential drawbacks of the ad hoc approach to cybersecurity implementation?

<p>Insufficient subject matter expertise</p> Signup and view all the answers

What is a common issue associated with the compliance-based approach to cybersecurity implementation?

<p>Checklist attitude toward security</p> Signup and view all the answers

What is a characteristic of the risk-based approach to cybersecurity implementation?

<p>Addressing risks above and beyond the entity’s risk tolerance and business needs</p> Signup and view all the answers

What term is used to refer to other individuals or enterprises with whom information must be shared?

<p>Third parties</p> Signup and view all the answers

Why is cybersecurity more difficult to control when third parties are involved?

<p>Third parties have different security cultures and risk tolerances</p> Signup and view all the answers

What is a common consequence of outsourcing functions onshore and offshore?

<p>Increased re-work often required</p> Signup and view all the answers

Why can outsourced/offshored functions present risk from an information security point of view?

<p>They operate on different standards and can be difficult to control</p> Signup and view all the answers

What is a potential drawback of outsourcing functions from an information security perspective?

<p>Difficulty in quantifying and mitigating risks</p> Signup and view all the answers

Why does information sharing with third parties pose a risk to enterprises?

<p>Third parties have different security cultures and risk tolerances</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser