Information Security for Decision-makers Literacy (Beginner Level)

  • 22m
  • 22 questions
The Information Security for Decision-makers Literacy (Beginner Level) benchmark measures your exposure to information security issues and processes. A learner who scores high on this benchmark demonstrates a general understanding of the basics of information security but requires additional learning to lead information security teams. They also can participate in InfoSec team discussions.

Topics covered

  • define authenticity and provide an overview of the six elements of the Parkerian hexad
  • define availability and discuss the importance of availability when planning security goals
  • describe how common backgrounds working in security or business management can help you become an InfoSec leader
  • describe how good interpersonal skills are help define a good security leader
  • describe how to best assemble an information security team
  • differentiate between cybersecurity and information security
  • differentiate between risks, threats, and vulnerabilities
  • differentiate between the responsibilities of a chief information security officer and a chief information officer
  • identify details of information security risk
  • identify some of the major considerations and challenges when considering outsourcing information security
  • list key components of an organizational crisis readiness program, including planning, training, technology, tools, and continuous improvement
  • list potential security technology predictions to plan for in the future
  • outline common leadership qualities of an InfoSec leader including functional leadership, responsiveness, service delivery, and governance
  • outline common responsibilities of a network security engineer, including ensuring hardware and software security and updating and patching resources
  • outline the importance of honesty and integrity in the realm of information security
  • outline the importance of performing an evaluation of security risks, threats, and vulnerabilities
  • outline the roles and responsibilities of a crisis management team
  • outline the use of information security over the decades
  • provide an overview of the confidentiality, integrity, and availability (CIA) triad
  • recognize how ransomware attacks will likely continue to increase
  • recognize new obstacles for the CIA triad such as big data and internet of things (IoT)
  • recognize what security vendors are and list the common related services they offer