Information Security (EN / 2019) von Lecturio Online Courses

video locked

Über den Vortrag

Der Vortrag „Information Security (EN / 2019)“ von Lecturio Online Courses ist Bestandteil des Kurses „Information Security (from Compliance Management Training EN)“. Der Vortrag ist dabei in folgende Kapitel unterteilt:

  • Introduction and Classification of Data
  • Awareness in Handling Data
  • Password Protection
  • E-mails and Viruses

Quiz zum Vortrag

  1. Open data - These are not subject to any access restrictions. No damage is caused by illegal access.
  2. External data - These are publicly available (e.g., website) and are therefore not subject to internal access restrictions. No damage is caused by illegal access.
  3. Internal data - This is accessible to a defined group of people within a company. Illegal access is likely to cause minor to moderate damage.
  4. Confidential data - This is accessible to a narrowly defined group of people within a company. Illegal access is likely to cause moderate damage.
  5. Strictly confidential data - This is only accessible to very few people. Illegal access is likely to cause existential damage.
  1. Most IT data is open, there is no access limitation, and no damage if accessed illegally.
  2. Confidential data is very limited, and the damage is minimal.
  3. Strictly confidential data is available to a very small circle of users and the damage would be significant if data was lost.
  4. Internal data is accessible to a defined circle.
  1. They should be destroyed after use.
  2. You should limit the circle of users.
  3. They should always be accessible to users.
  4. They should only be faxed.
  1. After the end of a workday, no important documents should be left on the desk.
  2. Passwords should be changed quarterly.
  3. Documents should be arranged according to importance.
  4. All files should be password-protected.
  1. By showing which classification the information has.
  2. By showing which restrictive access and access restrictions exist for other employees.
  3. By showing the negative consequences of publishing the project.
  4. By showing what penalties a publication of the project entails.
  1. Do not use confidential content in open networks
  2. https:// URLs should not be opened
  3. Restrict the use of cookies
  4. Use fake identities in social networks

Dozent des Vortrages Information Security (EN / 2019)

 Lecturio Online Courses

Lecturio Online Courses

Lecturio provides sustainable, simple and cost-efficient continuing education and training to companies and private customers. The e-learning catalogue consists of more than 7000 video-based courses covering over 80 topics. The focus is on compliance, leadership, project management, distribution, and medicine. Most of private customers use Lecturio in parallel to their studies and to prepare for their exams in medicine and law. Lecturio provides practical video-based online training—in German and English. Thousands of quiz questions help to measure and assess the learning success. Lecturio courses are available on all devices—and even offline with the iOS and Android app. Lecturio’s mission is to help companies and private customers to develop their full potential.


Kundenrezensionen

(1)
5,0 von 5 Sternen
5 Sterne
5
4 Sterne
0
3 Sterne
0
2 Sterne
0
1  Stern
0