Summary: Cism Certified Information Security Manager Bundle | 9781260459012 | Peter H Gregory
- This + 400k other summaries
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding
Read the summary and the most important questions on CISM Certified Information Security Manager Bundle | 9781260459012 | Peter H. Gregory
-
1 Becoming a CISM
This is a preview. There are 2 more flashcards available for chapter 1
Show more cards here -
How Many Domain are covered in CISM
Four -
Which Domain is describe in Chapter 2
Information Security Governance -
In which domain is Information Security Program Development and Management covered
Domain 3 -
2 Information Security Governance
This is a preview. There are 2 more flashcards available for chapter 2
Show more cards here -
Who is responsible for governance in a company
Board of Directors -
2.1 Introduction to information Security Governance
This is a preview. There are 3 more flashcards available for chapter 2.1
Show more cards here -
What is the purpose of Security Governance
To align the Security Program to the Business needs -
What is a desired capability or end state, ideally expressed in achievable, measurable terms?
Objectives -
Data owners must provide a safe and secure environment to ensure confidentiality, integrity and availability of the transaction. This is an example of which information security
Policy -
What is assumed as a minimum security level throughout an organization
Baseline -
Which of the following are likely to be updated Most frequently Policy, Standards, Procedures
Procedures (policies and standards are more static) -
2.1.1 Reason for Security Governance
This is a preview. There are 1 more flashcards available for chapter 2.1.1
Show more cards here -
With which triangle could you understand the priority of the business
CIA
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
Topics related to Summary: Cism Certified Information Security Manager Bundle
-
Information Security Governance - Introduction to information Security Governance - Reason for Security Governance
-
Information Security Governance - Security Strategy Development
-
Information Risk Management - Risk Management Concepts - The Importance of Risk Management
-
Information Risk Management - Implementing a Risk Management Program