This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. What is information security and how is it achieved? | |
2. What are the core principles of information security? | |
3. What is non-repudiation (as it applies to IT security)? | |
4. What is the relationship between information security and data availability? | |
5. What is a security policy and why do we need one? | |
6. What is the difference between logical and physical security? Can you give an example of both? | |
7. What’s an acceptable level of risk? | |
8. What are the most common types of attacks that threaten enterprise data security? | |
9. What is the difference between a threat and a vulnerability? | |
10. Can you give me an example of common security vulnerabilities? |