Ensuring the integrity of business information is the PRIMARY concern of
A.
Encryption Security
B.
Procedural Security.
C.
Logical Security
D.
On-line Security
Explanation:
Procedures are looked at as the lowest level in the policy chain because they are
closest to the computers and provide detailed steps for configuration and installation issues. They
provide the steps to actually implement the statements in the policies, standards, and
guidelines…Security procedures, standards, measures, practices, and policies cover a number of
different subject areas. – Shon Harris All-in-one CISSP Certification Guide pg 44-45
From the paragraph, how does it relate to “integrity of business information”. These questions are vague, explanation; even more vague.
Integrity is upheld when the assurance of the accuracy and reliability of information
and systems is provided and any unauthorized modification is prevented.
CIA
Encryption – C
Procedural – Grey
Logical – Grey
On-Line – A
Logical security is the provision of suitable computer hardware and software to allow automatic control of people and programs attempting to access computer resources or information through electronic means. Data encryption, a form of logical security, encodes data so that only those people or programs with a ‘key’ can understand the information or prove identity. Logical security is primarily concerned with ensuring the integrity (that is, the completeness, correctness, and privacy) of business information.
Physical security is concerned with ensuring the reliability of information services to the company.
Procedural security is concerned with the identification and authorization of users of electronic information and the historical tracking of electronic access to information.