A company planned to expand the Information Management & Security faculty of the business organisation and offered you the position of Information Systems & Security Auditor. Your role among other things is to ensure that the organisation’s systems and all IT Infrastructure comply with all known global Information Systems and Security Standards. As a security measure, the organisation is required to ensure that its Information Systems infrastructure, procedures and processes comply, and are properly registered with International Standards organisations like the ISO, among others. The business intends to always ensure that all systems and infrastructure are well protected and have acquired a high level of resilience in the event of a cyberattack of any kind or any act of fraud that may be attempted on the organisation as a prime target either by internal or external perpetrators. QUESTION 1.3 Articulate the procedure and/or methods that would be used by a organisation to authenticate documents supplied as credentials by employees and prospective employees alike.

Understanding Business
12th Edition
ISBN:9781259929434
Author:William Nickels
Publisher:William Nickels
Chapter1: Taking Risks And Making Profits Within The Dynamic Business Environment
Section: Chapter Questions
Problem 1CE
icon
Related questions
Question

A company planned to expand the Information Management & Security faculty of the business organisation and offered you the position of Information Systems & Security Auditor. Your role among other things is to ensure that the organisation’s systems and all IT Infrastructure comply with all known global Information Systems and Security Standards. As a security measure, the organisation is required to ensure that its Information Systems infrastructure, procedures and processes comply, and are properly registered with International Standards organisations like the ISO, among others. The business intends to always ensure that all systems and infrastructure are well protected and have acquired a high level of resilience in the event of a cyberattack of any kind or any act of fraud that may be attempted on the organisation as a prime target either by internal or external perpetrators.

QUESTION 1.3

Articulate the procedure and/or methods that would be used by a organisation to authenticate documents supplied as credentials by employees and prospective employees alike.

Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Understanding Business
Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education
Management (14th Edition)
Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON
Spreadsheet Modeling & Decision Analysis: A Pract…
Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning
Management Information Systems: Managing The Digi…
Management Information Systems: Managing The Digi…
Management
ISBN:
9780135191798
Author:
Kenneth C. Laudon, Jane P. Laudon
Publisher:
PEARSON
Business Essentials (12th Edition) (What's New in…
Business Essentials (12th Edition) (What's New in…
Management
ISBN:
9780134728391
Author:
Ronald J. Ebert, Ricky W. Griffin
Publisher:
PEARSON
Fundamentals of Management (10th Edition)
Fundamentals of Management (10th Edition)
Management
ISBN:
9780134237473
Author:
Stephen P. Robbins, Mary A. Coulter, David A. De Cenzo
Publisher:
PEARSON