Essay
In each statement that follows, circle the business risk or threat that most clearly applies based on the list provided in the text.
A. Disclosure of confidential information or intrusion: Employee data are made available on the Internet.
B. DOS attacks or extortion: Prevent computer systems from functioning in accordance with their intended purpose.
C. Error or web site defacement: Digital graffiti
d. Fraud or error: Losses can vary widely depending on where the problem originated.
E. Information theft or information manipulation: An employee creates fake refunds to benefit a family member.
F. Intrusion or extortion: Main objective is to gain access to a network.
G. Intrusion or service interruption: Classified as accidental, willful neglect or malicious behavior.
H. Malicious software or information theft: Logic bombs, replicating worm, Trojan horse.
I. Service interruption or disclosure of confidential information: Can lead to missed deadlines for receivables or payables.j. Web site defacement or extortion: Criminal contacts an organization after successfully stealing information.
Correct Answer:

Verified
Correct Answer:
Verified
Q1: The CoBIT framework can be used to
Q4: Consider the following examples of computer crime
Q6: Consider the following examples of computer crime
Q7: Information technology controls can be classified as
Q9: Organized crime and hackers are most likely
Q10: _ are _ driven by financial gain.<br>A)Hackers,
Q11: Consider the following examples of computer crime
Q26: All of the following are elements of
Q35: A bank's information system was hacked in
Q52: At HCK Corporation, only employees in the