Deck 15: Information Security Privacy in E-HRM

Full screen (f)
exit full mode
Question
A giant network connecting virtually any device at home or work to the internet, resulting in a 'relationship between people-people, people-things, and things-things' is called:

A) e-HRM
B) cyber security
C) Internet of Things (IoT)
D) cloud computing
Use Space or
up arrow
down arrow
to flip the card.
Question
__________ have evolved from worms and viruses to more advanced and organized attacks with the emergence of deception technologies.

A) Cyber security
B) Cyberattacks
C) Cloud computing
D) User credentials
Question
______________ is the "management framework to initiate, implement and control information security within the organization".

A) Information Security Management System (ISMS)
B) Plan-Do-Check-Act (PDCA) Cycle
C) Internet of Things (IoT)
D) Distributed Denial of Service Attacks (DDoS)
Question
The __________________ is considered the best-known standard in providing requirements for an information security management system (ISMS).

A) ISO/IEC 27000 family
B) COBIT
C) NIST
D) ISO/IEC 27001
Question
ISO defines _________ as "a systematic approach to managing sensitive company information so that it remains secure.

A) ISMS
B) COBIT
C) NIST
D) ISO/IEC 27001
Question
______________ starts with asset identification which involves identifying all the information repositaries that need to be protected for running the business.

A) Management assessment
B) Risk assessment
C) Performance assessment
D) Electronic assessment
Question
__________ are the external agents which could act to malicious effects.

A) Vulnerabilities
B) Controls
C) Threats
D) Risks
Question
_________ are the internal weakness in the system, such as unpatched system.

A) Vulnerabilities
B) Controls
C) Threats
D) Risks
Question
Individual's expectation that one will use their personal data as intended and protect it from disclosure to unauthorized parties defines:

A) cyber security
B) user credentials
C) SOX
D) data privacy
Question
In order to protect the Personal Identity Information (PII), organizations implement ______________.

A) sensitive personal data
B) privacy framework
C) data protection laws
D) consumer protection laws
Question
Why is information security and privacy critically important to businesses?
Question
What is Information Security Management System?
Question
Explain the critical role of HR in protecting information security and privacy?
Question
List and discuss three of the common privacy principles included in the chapter.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/14
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Information Security Privacy in E-HRM
1
A giant network connecting virtually any device at home or work to the internet, resulting in a 'relationship between people-people, people-things, and things-things' is called:

A) e-HRM
B) cyber security
C) Internet of Things (IoT)
D) cloud computing
C
2
__________ have evolved from worms and viruses to more advanced and organized attacks with the emergence of deception technologies.

A) Cyber security
B) Cyberattacks
C) Cloud computing
D) User credentials
B
3
______________ is the "management framework to initiate, implement and control information security within the organization".

A) Information Security Management System (ISMS)
B) Plan-Do-Check-Act (PDCA) Cycle
C) Internet of Things (IoT)
D) Distributed Denial of Service Attacks (DDoS)
A
4
The __________________ is considered the best-known standard in providing requirements for an information security management system (ISMS).

A) ISO/IEC 27000 family
B) COBIT
C) NIST
D) ISO/IEC 27001
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
5
ISO defines _________ as "a systematic approach to managing sensitive company information so that it remains secure.

A) ISMS
B) COBIT
C) NIST
D) ISO/IEC 27001
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
6
______________ starts with asset identification which involves identifying all the information repositaries that need to be protected for running the business.

A) Management assessment
B) Risk assessment
C) Performance assessment
D) Electronic assessment
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
7
__________ are the external agents which could act to malicious effects.

A) Vulnerabilities
B) Controls
C) Threats
D) Risks
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
8
_________ are the internal weakness in the system, such as unpatched system.

A) Vulnerabilities
B) Controls
C) Threats
D) Risks
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
9
Individual's expectation that one will use their personal data as intended and protect it from disclosure to unauthorized parties defines:

A) cyber security
B) user credentials
C) SOX
D) data privacy
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
10
In order to protect the Personal Identity Information (PII), organizations implement ______________.

A) sensitive personal data
B) privacy framework
C) data protection laws
D) consumer protection laws
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
11
Why is information security and privacy critically important to businesses?
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
12
What is Information Security Management System?
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
13
Explain the critical role of HR in protecting information security and privacy?
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
14
List and discuss three of the common privacy principles included in the chapter.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 14 flashcards in this deck.