Data Leakage Risk Mitigation | Best Practices | CISM Exam Prep

Addressing the Risk of Data Leakage

Prev Question Next Question

Question

Which of the following would BEST address the risk of data leakage?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

Acceptable use policies are the best measure for preventing the unauthorized disclosure of confidential information.

The other choices do not address confidentiality of information.

The BEST option for addressing the risk of data leakage is a combination of "Acceptable Use Policies" and "Incident Response Procedures".

Acceptable Use Policies (AUPs) define what is considered appropriate and inappropriate use of organizational resources, including data. They specify the responsibilities and limitations for users who access organizational data, and identify the consequences of non-compliance with the policy. AUPs set expectations for employees to use data in a responsible and ethical manner, thereby reducing the risk of accidental or intentional data leaks.

Incident Response Procedures (IRPs) are a set of documented procedures that an organization follows in response to an information security incident. IRPs ensure that the incident is contained, eradicated, and recovered from as quickly as possible. In the context of data leakage, IRPs would provide guidance on how to detect, investigate, and respond to incidents involving data loss or theft.

File backup procedures and database integrity checks are important components of a comprehensive information security program, but they do not directly address the risk of data leakage. Backup procedures ensure that data is recoverable in the event of an incident, while database integrity checks ensure that data stored in a database remains consistent and accurate. However, they do not prevent data leakage from occurring in the first place.

In conclusion, implementing acceptable use policies and incident response procedures would best address the risk of data leakage by setting expectations for responsible data use and providing guidance for responding to incidents involving data loss or theft.