Risk in the Workplace- Coursera
Which of these would you consider high-value targets for a potential attacker? Check all that apply.
Authentication databases Customer credit card information
What are some restrictions that should apply to sensitive and confidential data? Check all that apply.
It can be transferred via email. It can be stored on encrypted media only.
What's the purpose of a vulnerability scanner?
It detects vulnerabilities on your network and systems.
What's a privacy policy designed to guard against?
Misuse or abuse of sensitive data
What are some examples of security goals that you may have for an organization? Check all that apply.
To prevent unauthorized access to customer credentials To protect customer data from unauthorized access