More cards in this set

Card 6

Front

What should the policy include

Back

Preview of the front of card 6

Card 7

Front

What is a security policy

Back

Preview of the front of card 7

Card 8

Front

What are the three key security questions

Back

Preview of the front of card 8

Card 9

Front

What are the three primary threats to data

Back

Preview of the front of card 9

Card 10

Front

Name 2 external threats

Back

Preview of the front of card 10

Card 11

Front

Name 5 examples of incompetence

Back

Preview of the front of card 11

Card 12

Front

Give 2 examples of employee causes

Back

Preview of the front of card 12

Card 13

Front

Name 5 ways of improving awareness of a olicy

Back

Preview of the front of card 13

Card 14

Front

Name 6 disciplinary measures

Back

Preview of the front of card 14

Card 15

Front

What is a procurement policy

Back

Preview of the front of card 15