NPTEL Cyber Security and Privacy

NPTEL Cyber Security and Privacy Assignment 3 Answer 2023

We Discuss About That NPTEL Cyber Security and Privacy Assignment 3 Answer 2023

ABOUT THE COURSE:
This course introduces to management students the concepts, technologies, practices and challenges associated with cybersecurity as applied in organizations. Protection as well as disclosure of information pose unique challenges and also allude to economic and technological implications. The course takes a broad view of cyber security along with information privacy by analysing relevant organizational, human, legal and policy issues. Through this course, students will explore cyber security along with information privacy with a managerial focus. Students are expected to develop a wholesome understanding about cyber security and privacy risks to businesses covering governance, compliance and risk mitigation and closely study certain business domains.

PREREQUISITES : A core course on Management Information Systems desirable (not mandatory)

INDUSTRY SUPPORT : IT services industry, AI/Block chain start ups, Industry 4.0, autonomous vehicles industry

NPTEL Cyber Security and Privacy Assignment 3 Answer 2023

Answers will be Uploaded Shortly and it will be Notified on Telegram, So JOIN NOW
JoinScishowEngineerTelegram
  1. Which of the following terms best describe the specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls?
    • Answer: An information security framework
  2. True or False: SP 800-18, Guide for Developing Security Plans, is considered the foundation for a comprehensive security blueprint and framework.
    • Answer: True
  3. One of the foundations of security architectures is the requirement to implement security in layers. This layered approach is referred to as:
    • Answer: Defense in depth
  4. Control Objectives for Information and Related Technologies is a framework created by —— for information technology (IT) management and ————-
    • Answer: ISACA, & IT governance
  5. Three approaches to cyber security management are
    1. Governance-Risk-Compliance (GRC) approach

    2. Organizational planning approach
    • Answer: Security-driven approach
  6. ISO/IEC 27032:2012 involves guidelines for —————–
    • Answer: Cyber security
  7. The five goals of information security governance are
    1. —————–of information security with business strategy to support organizational objectives
    2. —————- by executing appropriate measures to manage and mitigate threats to information resources
    3. —————–by utilizing information security knowledge and infrastructure efficiently and effectively
    4. —————–by measuring, monitoring, and reporting information security governance metrics to ensure that organizational objectives are achieved
    5. —————–by optimizing information security investments in support of organizational objectives.
    • Answer: A-1, B-2, C-3, D-4, E-5
  8. Match ISO Series with the corresponding topic (A) 27000 (1)Series Overview and Terminology (B) 27003 (2)Information Security Management Systems Implementation Guidelines (C) 27004 (3) Information Security Measurements and Metrics (D) 27005 (4) ISMS Risk Management (E) 27006 (5) Requirements for Bodies Providing Audit and Certification of ISMS
    • Answer: A-1, B-2, C-3, D-4, E-5
  9. (1)—————— is authorized by policy from senior management and is usually carried out by senior IT and information security executives, such as the(2)———and-(3)——-
    • Answer: 1-CISO, 2-CIO, 3-CO
Answers will be Uploaded Shortly and it will be Notified on Telegram, So JOIN NOW
JoinScishowEngineerTelegram

Yhaa You have done it but next? if YOU Want to your Others NPTEL Cyber Security and Privacy Assignment 3 Answer 2023 Then Follow US HERE and Join Telegram.