Question: 9 . How does business logic relate to information security? A . Business logic represents decisions the company has made and may give it a
How does business logic relate to information security?
A Business logic represents decisions the company has made and may give it a competitive advantage over others in the marketplace; it needs to be protected from unauthorized disclosure or unauthorized change. Processes that implement the business logic need to be available to be run or used when needed. Thus, confidentiality, integrity, and availability apply.
B Business logic for specific tasks tends to be common across many businesses in a given market or industry; therefore, there is nothing confidential about it
C Business logic should dictate the priorities for information security efforts.
D Business logic is important during process design; in daily operations, the company uses its IT systems to get work done, so it has no relationship to operational information security concerns.
Your company uses computercontrolled machine tools on the factory floor as part of its assembly line. This morning, you've discovered that somebody erased a key set of machine control parameter files, and the backups you have will need to be updated and verified before you can use them. This may take most of the day to accomplish. What information security attribute is involved here?
A Confidentiality
B Integrity
C Availability
D Due care
Protection of intellectual property IP is an example of what kind of information security need?
A Privacy
B Confidentiality
C Availability
D Integrity
John works as the chief information security officer for a mediumsized chemical processing firm. Which of the following groups of people would not be stakeholders in the ongoing operation of this business?
A State and local tax authorities
B Businesses in the immediate neighborhood of John's company
C Vendors, customers, and others who do business with John's company
D The employees of the company
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
