Deck 15: Information Security Privacy in E-HRM
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/14
Play
Full screen (f)
Deck 15: Information Security Privacy in E-HRM
1
A giant network connecting virtually any device at home or work to the internet, resulting in a 'relationship between people-people, people-things, and things-things' is called:
A) e-HRM
B) cyber security
C) Internet of Things (IoT)
D) cloud computing
A) e-HRM
B) cyber security
C) Internet of Things (IoT)
D) cloud computing
C
2
__________ have evolved from worms and viruses to more advanced and organized attacks with the emergence of deception technologies.
A) Cyber security
B) Cyberattacks
C) Cloud computing
D) User credentials
A) Cyber security
B) Cyberattacks
C) Cloud computing
D) User credentials
B
3
______________ is the "management framework to initiate, implement and control information security within the organization".
A) Information Security Management System (ISMS)
B) Plan-Do-Check-Act (PDCA) Cycle
C) Internet of Things (IoT)
D) Distributed Denial of Service Attacks (DDoS)
A) Information Security Management System (ISMS)
B) Plan-Do-Check-Act (PDCA) Cycle
C) Internet of Things (IoT)
D) Distributed Denial of Service Attacks (DDoS)
A
4
The __________________ is considered the best-known standard in providing requirements for an information security management system (ISMS).
A) ISO/IEC 27000 family
B) COBIT
C) NIST
D) ISO/IEC 27001
A) ISO/IEC 27000 family
B) COBIT
C) NIST
D) ISO/IEC 27001
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
5
ISO defines _________ as "a systematic approach to managing sensitive company information so that it remains secure.
A) ISMS
B) COBIT
C) NIST
D) ISO/IEC 27001
A) ISMS
B) COBIT
C) NIST
D) ISO/IEC 27001
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
6
______________ starts with asset identification which involves identifying all the information repositaries that need to be protected for running the business.
A) Management assessment
B) Risk assessment
C) Performance assessment
D) Electronic assessment
A) Management assessment
B) Risk assessment
C) Performance assessment
D) Electronic assessment
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
7
__________ are the external agents which could act to malicious effects.
A) Vulnerabilities
B) Controls
C) Threats
D) Risks
A) Vulnerabilities
B) Controls
C) Threats
D) Risks
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
8
_________ are the internal weakness in the system, such as unpatched system.
A) Vulnerabilities
B) Controls
C) Threats
D) Risks
A) Vulnerabilities
B) Controls
C) Threats
D) Risks
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
9
Individual's expectation that one will use their personal data as intended and protect it from disclosure to unauthorized parties defines:
A) cyber security
B) user credentials
C) SOX
D) data privacy
A) cyber security
B) user credentials
C) SOX
D) data privacy
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
10
In order to protect the Personal Identity Information (PII), organizations implement ______________.
A) sensitive personal data
B) privacy framework
C) data protection laws
D) consumer protection laws
A) sensitive personal data
B) privacy framework
C) data protection laws
D) consumer protection laws
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
11
Why is information security and privacy critically important to businesses?
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
12
What is Information Security Management System?
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
13
Explain the critical role of HR in protecting information security and privacy?
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
14
List and discuss three of the common privacy principles included in the chapter.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck