File protection rules are designed to inhibit unauthorized access, modification, and deletion of a file. The access granularity principle states that protection at the data file level is considered coarse granularity, whereas protection at the data field level is considered to be of a finer granularity. Both strengthen the security practices.
The objectives of trans-border data flows and data privacy laws are to protect personal data from unauthorized disclosure, modification, and destruction. Trans-border data flow is the transfer of data across national borders. Privacy refers to the social balance between an individual’s right to keep information confidential and the societal benefit derived from sharing information. Both strengthen the security practices.
21. Which of the following is
a. Describe major application systems.
b. Define the security requirements.
c. Describe the security controls.
d. Delineate the roles and responsibilities.
The major purposes of the information system security plan are to (i) provide an overview of the security requirements of the system, (ii) describe the security controls in place or planned for meeting those requirements, (iii) delineate the roles and responsibilities, and (iv) define the expected behavior of all individuals who access the system.
22. The information system security plan is an important deliverable in which of the following processes?
a. Configuration management
b. System development life cycle
c. Network monitoring
d. Continuous assessment
23. Which of the following approves the system security plan prior to the security certification and accreditation process?
a. Information system owner
b. Program manager
c. Information system security officer
d. Business owner
24. Which of the following is the key factor in the development of the security assessment and authorization policy?
a. Risk management
b. Continuous monitoring
c. Testing the system
d. Evaluating the system
25. Which of the following is a prerequisite for developing an information system security plan?
1. Security categorization of a system
2. Analysis of impacts
3. Grouping of general support systems
4. Labeling of major application systems
a. 1 and 4
b. 2 and 3
c. 1 and 2
d. 3 and 4
26. Which of the following defines security boundaries for an information system?
1. Information
2. Personnel
3. Equipment
4. Funds
a. 1 only
b. 1 and 2
c. 1 and 3