In each statement that follows, circle the business risk or threat that most clearly applies based on the list provided in the text.
a.Disclosure of confidential information or intrusion: Employee data are made available on the Internet.
b.DOS attacks or extortion: Prevent computer systems from functioning in accordance with their intended purpose.
c.Error or web site defacement: Digital graffiti.
d.Fraud or error: Losses can vary widely depending on where the problem originated.
e.Information theft or information manipulation: An employee creates fake refunds to benefit a family member.
f.Intrusion or extortion: Main objective is to gain access to a network.
g.Intrusion or service interruption: Classified as accidental, willful neglect or malicious behavior.
h.Malicious software or information theft: Logic bombs, replicating worm, Trojan horse.
i.Service interruption or disclosure of confidential information: Can lead to missed deadlines for receivables or payables.
j.Web site defacement or extortion: Criminal contacts an organization after successfully stealing information.
Correct Answer:
Verified
View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Q58: Carter suggested a four-part taxonomy for classifying
Q59: COBIT's enablers include culture, ethics and behavior.Which
Q60: COBIT's enablers include people, skills and competencies.Functional
Q61: The chapter discussed eleven examples of risks
Q62: The chapter discussed the four elements of
Q64: For each IT control listed below, indicate
Q65: The COBIT framework comprises five principles and
Q66: List the elements of Carter's taxonomy of
Q67: Which element of Carter's taxonomy of computer
Q68: Fill in the blanks below according to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents