Identifying patterns in data using data from more than one source is commonly known as...?
Collaborative filtering is a technique used in recommendation systems where multiple data sources (e.g., previous purchases, browsing habits, and ratings from other users) are combined to predict user preferences.
If data has been modified, which aspect of the Information Security triangle has been breached?
Integrity refers to the trustworthiness and accuracy of data. If data has been altered, its integrity has been compromised. The Information Security Triangle consists of Confidentiality, Integrity, and Availability (CIA). Accuracy is not part of this model. (P.143)
IT hacking can take many forms, and it is important for Procurement professionals to be aware of different ways their data can be compromised or stolen through cyber attacks. Which of the following is not a type of cyber attack?
Gooseberry is not a type of cyber attack. The others---birthday attacks, phishing, and man-in-the-middle---are real cybersecurity threats. Other common attacks include malware, denial of service (DoS), drive-by attacks, password attacks, SQL injection, cross-site scripting, and eavesdropping. (P.146)
Alicia is aware of the dangers of IT hacking and has therefore created a risk assessment to assess how susceptible her business is to this threat. In her risk assessment, she has considered her employees and suppliers. Is this the correct thing to do?
While it is important to consider employees and suppliers, cybersecurity risks can exist at various points in the supply chain. Alicia needs to assess potential threats at every stage. A risk assessment alone does not protect against threats (Option B is incorrect), and there is no indication that a third party must complete the assessment (Option D). (P.154)
At what stage in the procurement cycle should a buyer clarify a supplier's cybersecurity policy?
Cybersecurity policies should be evaluated as early as possible in the procurement process. The pre-qualification stage allows buyers to assess suppliers' security practices before inviting them to bid, ensuring that only secure vendors are considered. (P.156)
Maryanne
7 days agoFelicitas
8 days ago