There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer.
What are the consequences of this to the reliability of the information?
As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an
organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?