15. What procedures and policies do you follow to guard the availability of information?
53
Information Accuracy
16. What are your rules for who has access to the information and who has not?
17. What is your protection policy for external attacks? (Firewalls)
18. Do you have any intention to enhance the information security?
Information Traceability
19.
How can you track who did what at what time with some information?
Standards
20. Did your organization follow any standard while implementing information security
management system?
Risk Awareness and Preventive Measures
21. How to allocate resources in the different parts of the Information Risk Management?
22.
How do the employees in your organization know about the information security
operational risks? (Risk awareness, risk culture)
Do'stlaringiz bilan baham: