Five attributes in ISO 27002

Five attributes in ISO 27002

Assessment

Interactive Video

Information Technology (IT), Architecture, Social Studies

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial covers risk assessment and the use of SOA attributes, emphasizing the CIA model for information security. It discusses confidentiality, access control, and encryption methods. Cybersecurity concepts are introduced, aligning with frameworks like NIST CSF. Operational capabilities and security domains are explored, providing a comprehensive view of information security practices.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one method to ensure confidentiality in information security?

Using public key infrastructure

Implementing access control lists

Developing a risk management plan

Conducting regular audits

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which model is used to depict information security by focusing on availability, integrity, and confidentiality?

OSI Model

CIA Model

NIST Model

ISO Model

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the five key attributes introduced in the 2022 edition of the cybersecurity standard?

Plan, Do, Check, Act, Review

Identify, Protect, Detect, Respond, Recover

Assess, Mitigate, Monitor, Report, Improve

Analyze, Design, Implement, Test, Deploy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which framework is harmonized with the cybersecurity concepts of identify, protect, detect, respond, and recover?

TOGAF

NIST CSF

ITIL

COBIT

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered an operational capability in information security?

Asset Management

Financial Auditing

Application Security

Governance