K01 (Part 2) Flashcards
(8 cards)
Why undertake risk assessments?
Protect employees
Replace faulty equipment
Reduce insurance costs
Maintain professionalism
To comply with health & safety laws
What are the four main ways of considering risks?
Mitigate the risk
Accept the risk
Avoid/resolve the risk
Transfer the risk
What are the steps involved in controlling risks?
Control them
Identify hazards
Assess the risks
Record findings
Review controls
What is an Acceptable Use Policy?
Rules that define what actions are allowed or banned on a network to ensure legal and ethical use.
What is a BYOD Policy?
Rules that allow users to use personal devices for work while ensuring secure access to company systems and data.
What is a Cybersecurity Policy?
Rules and procedures to safeguard an organisation’s systems and data from cyber threats.
What is a Password Policy?
Rules that enforce strong passwords to enhance system and network security.
What is a Software Usage Policy?
Guidelines that ensure software is used legally, safely, and responsibly by users.