Information Security (EN / 2019) by Lecturio Online Courses

video locked

About the Lecture

The lecture Information Security (EN / 2019) by Lecturio Online Courses is from the course Compliance Management Training (EN). It contains the following chapters:

  • Introduction and Classification of Data
  • Awareness in Handling Data
  • Password Protection
  • E-mails and Viruses

Included Quiz Questions

  1. Open data - These are not subject to any access restrictions. No damage is caused by illegal access.
  2. External data - These are publicly available (e.g., website) and are therefore not subject to internal access restrictions. No damage is caused by illegal access.
  3. Internal data - This is accessible to a defined group of people within a company. Illegal access is likely to cause minor to moderate damage.
  4. Confidential data - This is accessible to a narrowly defined group of people within a company. Illegal access is likely to cause moderate damage.
  5. Strictly confidential data - This is only accessible to very few people. Illegal access is likely to cause existential damage.
  1. Most IT data is open, there is no access limitation, and no damage if accessed illegally.
  2. Confidential data is very limited, and the damage is minimal.
  3. Strictly confidential data is available to a very small circle of users and the damage would be significant if data was lost.
  4. Internal data is accessible to a defined circle.
  1. They should be destroyed after use.
  2. You should limit the circle of users.
  3. They should always be accessible to users.
  4. They should only be faxed.
  1. After the end of a workday, no important documents should be left on the desk.
  2. Passwords should be changed quarterly.
  3. Documents should be arranged according to importance.
  4. All files should be password-protected.
  1. By showing which classification the information has.
  2. By showing which restrictive access and access restrictions exist for other employees.
  3. By showing the negative consequences of publishing the project.
  4. By showing what penalties a publication of the project entails.
  1. Do not use confidential content in open networks
  2. https:// URLs should not be opened
  3. Restrict the use of cookies
  4. Use fake identities in social networks

Author of lecture Information Security (EN / 2019)

 Lecturio Online Courses

Lecturio Online Courses


Customer reviews

(1)
5,0 of 5 stars
5 Stars
5
4 Stars
0
3 Stars
0
2 Stars
0
1  Star
0