What is the benefit of an organisation using blockchain in data management?
Blockchain ensures data integrity by preventing modifications. If changes are needed, new blocks are added instead of altering existing ones. This enhances transparency and security, as blockchain is decentralized and not vulnerable to a single point of failure. (P.189)
Identifying patterns in data using data from more than one source is commonly known as...?
Collaborative filtering is a technique used in recommendation systems where multiple data sources (e.g., previous purchases, browsing habits, and ratings from other users) are combined to predict user preferences.
If data has been modified, which aspect of the Information Security triangle has been breached?
Integrity refers to the trustworthiness and accuracy of data. If data has been altered, its integrity has been compromised. The Information Security Triangle consists of Confidentiality, Integrity, and Availability (CIA). Accuracy is not part of this model. (P.143)
IT hacking can take many forms, and it is important for Procurement professionals to be aware of different ways their data can be compromised or stolen through cyber attacks. Which of the following is not a type of cyber attack?
Gooseberry is not a type of cyber attack. The others---birthday attacks, phishing, and man-in-the-middle---are real cybersecurity threats. Other common attacks include malware, denial of service (DoS), drive-by attacks, password attacks, SQL injection, cross-site scripting, and eavesdropping. (P.146)
Alicia is aware of the dangers of IT hacking and has therefore created a risk assessment to assess how susceptible her business is to this threat. In her risk assessment, she has considered her employees and suppliers. Is this the correct thing to do?
While it is important to consider employees and suppliers, cybersecurity risks can exist at various points in the supply chain. Alicia needs to assess potential threats at every stage. A risk assessment alone does not protect against threats (Option B is incorrect), and there is no indication that a third party must complete the assessment (Option D). (P.154)
Glynda
13 days agoMaryanne
26 days agoFelicitas
27 days ago