Information Security Questions
Information Security Questions
2. What is an Access Control Matrix (ACM) and its importance in Information Security?
An Access Control Matrix (ACM) is a framework that defines who can access specific resources and
what actions they can perform. It consists of:
- Subjects: Users, processes, or entities requesting access.
- Objects: Files, databases, or system resources that need protection.
- Access Rights: Permissions granted to a subject over an object (e.g., Read, Write, Execute).
Importance:
- Enforces security policies by restricting unauthorized access.
- Helps organizations manage roles and permissions efficiently.
- Prevents data breaches by defining clear access rules.
- Supports implementation of security models like Role-Based Access Control (RBAC).
Impact:
- Data loss, financial damage, and reputational harm.
- Operational disruption and legal penalties for data breaches.
- Increased cybersecurity costs for organizations to mitigate risks.
6. Explain Security Policies and why they are essential for organizations.
Security policies are formal rules that organizations follow to protect digital assets and ensure
compliance. Key types include:
- Confidentiality Policies: Restrict access to sensitive information.
- Integrity Policies: Ensure data remains accurate and unaltered.
- Access Control Policies: Define user roles and permissions for accessing resources.
- Incident Response Policies: Outline steps to handle security breaches.
Importance:
- Prevents unauthorized access and data breaches.
- Ensures regulatory compliance (e.g., GDPR, HIPAA).
- Establishes a framework for cybersecurity best practices.
- Reduces financial losses from cyber incidents.
This document provides structured 5-mark and 10-mark questions with detailed answers.