When identifying legal and regulatory issues affecting information security, which of the following would represent the BEST approach to developing information security policies?
A company's mail server allows anonymous file transfer protocol (FTP) access which could be exploited. What process should the information security manager deploy to determine the necessity for remedial action?
In information security governance, the PRIMARY role of the board of directors is to ensure:
Which of the following is the MOST important consideration for an organization interacting with the media during a disaster?
A new e-mail virus that uses an attachment disguised as a picture file is spreading rapidly over the Internet.
Which of the following should be performed FIRST in response to this threat?