SOFTWARE ENGINEERING

SOFTWARE TESTING

TESTING PRINCIPLES AND CONCEPTS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following is an approach to implement information Security policy? (Unit 14)
A
Minimal Use of Data in Web Pages
B
Use of videos and animated contents in the website
C
Provide information security awareness training to the developers
D
Provide access to the websites for unauthorized users
Explanation: 

Detailed explanation-1: -Encryption. Antivirus And Anti-Malware Software. Firewalls. Security Information And Event Management (SIEM)

Detailed explanation-2: -Technical security policies describe the configuration of the technology for convenient use; body security policies address however all persons should behave.

Detailed explanation-3: -Step 1: Build an Information Security Team. Step 2: Inventory and Manage Assets. Step 3: Assess Risk. Step 4: Manage Risk. Step 5: Develop an Incident Management and Disaster Recovery Plan. Step 6: Inventory and Manage Third Parties. Step 7: Apply Security Controls. More items

There is 1 question to complete.