As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an
organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?
In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:
You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.
What kind of threat is this?
In what part of the process to grant access to a system does the user present a token?
Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?