GOVERNANCE - Information security governance overview

13 important questions on GOVERNANCE - Information security governance overview

How is corporate governance broadly defined?

The rules that run an organization, including policies, standards and procedures that are used to set direction and control the organization's activities

In which terms are outcomes of an IS program stated?

In terms of risk management and the levels of acceptable risk

What is used to set control objectives?

The outcomes and levels of acceptable risk
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

Why are security policies developed?

To mitigate risk

When are policies developed?

In response to an actual or perceived threat

What do policies state?

Management intent and direction at high level

Why are standards developed?

To set boundaries for people, processes , procedures, and technologies to maintain compliance with policies & achieve objectives

What does create a security baseline?

Standards combined with other controls (technical, admin, physical)


What does set the security baseline?

Residual risk


What are the 6 basic outcomes of effective security governance

  1. Strategy alignment
  2. Risk managment
  3. Value delivery
  4. Resource management
  5. Performance management: IT Scorecards
  6. Integration of security

Who defines responsibilities for everyone in the organization with regards to information security

The information security manager

Does information security focus on IT systems or content?

Information security takes the larger view that content, information and knowledge based on it must be adequately protected.

What are the benefits of security governance


Compliance and protection form litigation and penalties
  1. Cost savings through better risk management
  2. Reduced risks and potential business impacts to an acceptable level
  3. Better oversight of systems and business
  4. Opportunity to leverage new technologies
  5. Business value generate through optimization of security

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo