IIBA IIBA-CCA - Certificate in Cybersecurity Analysis (CCA)
What common mitigation tool is used for directly handling or treating cyber risks?
The process by which organizations assess the data they hold and the level of protection it should be given based on its risk to loss or harm from disclosure, is known as:
Which organizational area would drive a cybersecurity infrastructure Business Case?
Organizations who don't quantify this will likely miss opportunities toward achieving strategic goals and objectives:
The hash function supports data in transit by ensuring:
Analyst B has discovered multiple attempts from unauthorized users to access confidential data. This is most likely?
Which organizational resource category is known as "the first and last line of defense" from an attack?
What business analysis deliverable would be an essential input when designing an audit log report?
Which of the following should be addressed by functional security requirements?
Protecting data at rest secures data that is:
