GradePack

    • Home
    • Blog
Skip to content
bg
bg
bg
bg

Author Archives: Anonymous

Data privacy guidelines also include aspects of data integri…

Data privacy guidelines also include aspects of data integrity—keeping the information complete and accurate.

Read Details

“Five nines” up-time means more reliability than “four-nines…

“Five nines” up-time means more reliability than “four-nines” up-time.

Read Details

All technology systems should come with redundancies to guar…

All technology systems should come with redundancies to guarantee 100% “up time”

Read Details

Why are “post-incident activities” important?

Why are “post-incident activities” important?

Read Details

You may remember that there are four phases when responding…

You may remember that there are four phases when responding to technology incidents—whether they were caused intentionally, or incompetently, or by the forces of nature.Describe each phase briefly and, in your words, describe also how each phase contributes to broader risk management. How does each phase connect directly to an organization’s broader ability to actively mitigate known risks?You may optionally apply these phases / risk management contributions to any organization that interests you. You are not required to use the same organization from the prior answer.  If you use an organization, speculate as to the organization’s details however feasible.Use no more than 600 words in total.

Read Details

Ralph wants to log in on Alice’s endpoint, but doesn’t have…

Ralph wants to log in on Alice’s endpoint, but doesn’t have her password. He begins guessing every password that he can think of, and will not stop before he finds a password that works. This is an example of:

Read Details

The enterprise risk management frameworks can readily integr…

The enterprise risk management frameworks can readily integrate cyber-relevant risks and controls, as well as completely unrelated risks like natural disasters and physical sabotage.

Read Details

The outage of an endpoint device would probably trigger the…

The outage of an endpoint device would probably trigger the need for disaster recovery.

Read Details

If an incident response plan is approved by management, then…

If an incident response plan is approved by management, then there is no need to test that plan.

Read Details

The emperor of Mongo has decided to knock out the internet-f…

The emperor of Mongo has decided to knock out the internet-facing connections of Earth’s largest corporation, MicroFlitter. The emperor then breaches several endpoints around the globe, and all those breached endpoints relay nonsense data packets at MicroFlitter, whose network then collapses under the strain. What just happened here?

Read Details

Posts pagination

Newer posts 1 … 5,128 5,129 5,130 5,131 5,132 … 84,451 Older posts

GradePack

  • Privacy Policy
  • Terms of Service
Top