SKILL BENCHMARK
Information Security for Decision-makers Literacy (Beginner Level)
- 22m
- 22 questions
The Information Security for Decision-makers Literacy (Beginner Level) benchmark measures your exposure to information security issues and processes. A learner who scores high on this benchmark demonstrates a general understanding of the basics of information security but requires additional learning to lead information security teams. They also can participate in InfoSec team discussions.
Topics covered
- define authenticity and provide an overview of the six elements of the Parkerian hexad
- define availability and discuss the importance of availability when planning security goals
- describe how common backgrounds working in security or business management can help you become an InfoSec leader
- describe how good interpersonal skills are help define a good security leader
- describe how to best assemble an information security team
- differentiate between cybersecurity and information security
- differentiate between risks, threats, and vulnerabilities
- differentiate between the responsibilities of a chief information security officer and a chief information officer
- identify details of information security risk
- identify some of the major considerations and challenges when considering outsourcing information security
- list key components of an organizational crisis readiness program, including planning, training, technology, tools, and continuous improvement
- list potential security technology predictions to plan for in the future
- outline common leadership qualities of an InfoSec leader including functional leadership, responsiveness, service delivery, and governance
- outline common responsibilities of a network security engineer, including ensuring hardware and software security and updating and patching resources
- outline the importance of honesty and integrity in the realm of information security
- outline the importance of performing an evaluation of security risks, threats, and vulnerabilities
- outline the roles and responsibilities of a crisis management team
- outline the use of information security over the decades
- provide an overview of the confidentiality, integrity, and availability (CIA) triad
- recognize how ransomware attacks will likely continue to increase
- recognize new obstacles for the CIA triad such as big data and internet of things (IoT)
- recognize what security vendors are and list the common related services they offer