Essay
Information technology controls can be classified as physical, technical or administrative. Consider each independent situation below; suggest one control from the indicated classification that would address (prevent / detect / correct) the risk.a) A bank's customer database is hacked.Administrative: _____________________________________________
b) A careless employee spills coffee on a network server.Physical: _____________________________________________
c) A corporation's sales data are manipulated by a member of the sales staff. Technical: _____________________________________________
d) A former employee introduces a logic bomb to a company's payroll system.Administrative: _____________________________________________
e) A political candidate's web site is defaced.Technical: _____________________________________________
f) A senior citizen sends money to a fake religious organization based on a fraudulent e-mail.Administrative: _____________________________________________
g) A waitress steals a customer's credit card number.Physical: _____________________________________________
h) An employee uses work time to shop online using the company's computer. Administrative: _____________________________________________
i) Corporate spies steal research and development information. Technical: _____________________________________________
j) Fake compromising photos of a corporate CEO are posted to a social networking site. Technical: _____________________________________________
A. regular security auditsb. encase the server in a cabinetc. system access logd. policy to remove employees from the system when they leave the companye. password rotationf. security trainingg. customers pay at the registerh. appropriate use poli
Correct Answer:

Verified
a regular security auditsb encase the se...View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Correct Answer:
Verified
View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Q3: In each statement that follows, circle the
Q4: Consider the following examples of computer crime
Q6: Consider the following examples of computer crime
Q9: Organized crime and hackers are most likely
Q10: _ are _ driven by financial gain.<br>A)Hackers,
Q11: Consider the following examples of computer crime
Q12: Consider the following short case as you
Q26: All of the following are elements of
Q35: A bank's information system was hacked in
Q52: At HCK Corporation, only employees in the