Information security is crucial in today’s digital world 43893 TCS Answers course. The 43893 TCS Answers helps associates gain knowledge on basic security concepts, policies, best practices and their responsibilities. This article provides all the questions and answers for the TCS Information Security Awareness Main Course LCS WBT 43893 TCS Answers. The course covers important topics around information security basics, policies, and best practices.
43893 tcs course: Download PDF
43893 TCS Answers :
Section 1: Information Classification
Question 1
Question 2:
Section 2: Password Management
Question 3:
Question 4:
TCS Course Answers all :
TCS RIO : Remote Internship
56978 TCS Answers : Agile E1
43893 TCS Answers : Information Security Awareness
7408 TCS Answers : iSecurity quiz
21939 TCS Answers : TCS Code of Conduct
64091 TCS Answers : Mastering TCS Data Privacy
55220 TCS Answers : Navigating Success GDPR
62297 TCS Answers : TCS SBWS Mode Assessment
2735 TCS Answers : Sexual Harassment Success
Section 3: Email Security
Question 5:
Question 6:
Section 4: Internet and Device Security
Question 7:
Question 8:
Section 5: Social Engineering
Question 9:
Question 10:
Section 6: Device and Media Handling
Question 11:
Question 12:
Section 7: Information Security Policies
Question 13:
Question 14:
Section 8: Information Security Best Practices
Question 15:
Question 16:
43893 TCS Answers
Information Assets
Information assets at TCS include confidential data like customer details, source code etc. Controls protect these assets from threats.
- Customer databases, source code, technical designs, project plans are some examples of information assets.
- Controls involve policies, awareness programs, encryption etc. to safeguard assets from unauthorized access or usage.
Information Classification
TCS classifies information into different categories based on sensitivity.
- Public – Freely available information with no restrictions
- Internal – For internal circulation but not for external distribution
- Confidential – Unauthorized disclosure can impact business competitiveness
- Strictly Confidential – Disclosures can seriously damage business
Access Control
Controlling who can access what information is crucial. Some important access control measures are:
- User ID-Password: Unique credentials issued to access authorized systems/data
- Authorization: Granting access to only required information based on job role
- Authentication: Verifying identity through something you know (password), have (token) or are (biometrics)
- Account management: Timely closure of terminated/inactive user accounts
Information Handling
Proper handling reduces security risks from accidental or intentional misuse of information assets. Some key practices are:
- Classify and label information as per sensitivity
- Access information only on need to know basis in authorized locations
- Avoid discussing confidential matters in public
- Report security incidents/concerns without fear of retribution
- Physically secure printouts, avoid working in public, log off when away
Information Transfer
Controls ensure information in transit is protected from interception or modification risks. Some examples:
- Encrypt email attachments containing sensitive data
- Use secure file transfer mechanisms for large/critical data
- Physically transfer storage devices instead of mailing them
- Secure laptops/devices as per travel security policies if travelling abroad
Computer Security
Safety measures help protect systems and information stored on them. Key aspects include:
- Use firewall and antivirus softwares to block malware
- Apply OS security patches, updates on time
- Use strong, unique passwords and don’t share them
- Exercise caution against phishing/spam emails, links and unknown USB devices
- Lock screen/log off when system is unattended even for short whiles
Network Security
Controls ensure information remains secure while being transported over networks. Some examples are:
- Encrypt sensitive information transmitted wirelessly
- Use corporate approved secured network connections
- Be careful of open/public WiFi networks which can be compromised
- Disable network discovery, file/printer sharing to avoid intrusions
- Monitor for and report suspicious network activity without delay
Information Security Awareness
Being aware of risks helps associates take necessary precautions. Important awareness aspects are:
- Complete mandatory security awareness training periodically
- Follow security best practices and policies shared through communication channels
- Report security incidents/vulnerabilities without delay
- Clarify doubts from Information Security team if any aspect is unclear
Associate Responsibilities
Each associate plays a vital role in information security. Some key responsibilities include:
- Follow security policies, process and guidelines diligently
- Immediately report security incidents/breaches encountered
- Handle TCS as well as customer information with care and confidentiality
- Undergo periodic security awareness training provided by the company
- Clarify doubts and provide suggestions to strengthen security practices