• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
In Information security Management what does a "Control" consist of?
* Organize
* Establish framework
* Allocate responsibilities
In Information security Management what does a "Evaluate" consist of?
* Internal audits
* External audits
* Self assessments
* Security incidents
In Information security Management what does a "Plan" consist of?
* Service Level Agreements
* Underpinning contracts
* Operational Level Agreements
* Policy Statements
In Information security Management what does a "Implement" consist of?
* Create awareness
* Classification and registration
* Personnel security
* Physical security
* Networks, applications, computers
* Management of access rights
* Security incident procedures
In Information security Management what does a "Maintain" consist of?
* Learn
* Improve
* Plan
* Implement
What are the 5 elements of Information Security Management?
* Control
* Evaluate
* Plan
* Impliment
* Maintain
Define Usuability Requirements.
Helps establish performance standards and define test scenarios for user evaluation.
Define Functional Requirements.
Describes what the service is intended to do.
Define Management and Operational Requirements.
Non-functional and describes service requirements and constraints
What are the three types of requirements>
1. Usuability
2. Functional
3. Management and Operational Requirements
What does MoSCoW stand for?
Must have
Should have
Could have
Won't but would like