CIPM CH 4 Protect Flashcards

1
Q

Information security management system

A

A set of processes that provides management with governance capabilities to manage the entire information security program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identity and access management

A

Foundational Activities

. Measurement of an accurate inventory of workers in the organization

. Measurement of all these workers access rights to networks, systems, data, applications, and places where business operations systems take place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access controls

A

Are used to determine whether and how subjects (usually person) are able to access objects, using the systems and or data,

Logical access controls works two ways:
. Subject access: a logical Access Control uses some means to determine the identity of a subject requesting access

. service access: access control is used to control the types of messages that are allowed to pass through a control port. Logical access control is designed to permit or deny messages of specified types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly