Information Technology Controls Can Be Classified as Physical, Technical or Administrative.Consider
Information technology controls can be classified as physical, technical or administrative.Consider each independent situation below; suggest one control from the indicated classification that would address (prevent/detect/correct) the risk.a) A bank's customer database is hacked.Administrative: _____________________________________________
b) A careless employee spills coffee on a network server.Physical: _____________________________________________
c) A corporation's sales data are manipulated by a member of the sales staff.Technical: _____________________________________________
d) A former employee introduces a logic bomb to a company's payroll system.Administrative: _____________________________________________
e) A political candidate's web site is defaced.Technical: _____________________________________________
f) A senior citizen sends money to a fake religious organization based on a fraudulent e-mail.Administrative: _____________________________________________
g) A waitress steals a customer's credit card number.Physical: _____________________________________________
h) An employee uses work time to shop online using the company's computer.Administrative: _____________________________________________
i) Corporate spies steal research and development information.Technical: _____________________________________________
j) Fake compromising photos of a corporate CEO are posted to a social networking site.Technical: _____________________________________________
Correct Answer:
Verified
b.enclose t...
View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Q62: The chapter discussed the four elements of
Q63: In each statement that follows, circle the
Q64: For each IT control listed below, indicate
Q65: The COBIT framework comprises five principles and
Q66: List the elements of Carter's taxonomy of
Q67: Which element of Carter's taxonomy of computer
Q68: Fill in the blanks below according to
Q69: Ethan is an information technology security consultant.He
Q71: The CoBIT framework can be used to
Q72: A private university maintains sensitive information about
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents