Logical Access
Data Classification
100

What methods can you use to familiarize yourself with the IT Environment? 

Walkthrough, Interviews, Document Reviews, Risk Assessments

100

What are these examples of: internal policies, procedures, normal business email messages, information controlled by legislation, etc. 

Private Information

200

Who are key people to interview about the logical access permissions? 

Security administrators, network control managers, systems software manager

200

Who is responsible for the information and should decide on the appropriate classification? 

Information Owner

300

What should be identified within the report in the event of an unsuccessful login attempt?

Time, terminal, logon and file or data element for which access was attempted.

300

What are some things data classification as a control should define? 

Importance of the information asset

Information asset owner

Process for granting access

Person responsible for approving access

Extent and depth of security controls.

400

What should an application systems manual include? (Give one example)

Information about the platform the application can run on, DBMS, compilers, interpreters, telecommunication monitors and other application that can run with the application.

400

What requirements are considered when classifying data? 

Legal, regulatory, contractual, and internal

M
e
n
u