Which of the following security concepts would Sara, the security administrator, use to
mitigate the risk of data loss?

A.
Record time offset
B.
Clean desk policy
C.
Cloud computing
D.
Routine log review
You must be logged in to post a comment.
Why not C.
0
0
Thats risk Transference.
0
0
Incorrect Answers:
A: Record time offset is usually critical in the event of forensic investigations.
C: Cloud computing means hosting services and data on the Internet instead of hosting it locally. This poses a security risk and you will need to apply measures to mitigate the risk. Cloud computing as a result INCREASES the risk of data loss as data leaves our network and is no longer under our direct control
D: Routine log reviews, albeit system logs or event logs, or audit logs, security log or access logs, are used to monitor and diagnose networks.
So in this case the best answer is: “B. Clean desk policy”
Clean Desk Policy Information on a desk—in terms of printouts, pads of note paper, sticky notes, and the like—can be easily seen by prying eyes and taken by thieving hands.
To protect data and your business, encourage employees to maintain clean desks and to leave out only those papers that are relevant to the project they are working on at that moment. All sensitive information should be put away when the employee is away from their desk. This will mitigate the risk of data loss when applied.
0
0