Information Technology Controls Can Be Classified as Physical, Technical or Administrative.Consider
Essay
Information technology controls can be classified as physical, technical or administrative.Consider each independent situation below; suggest one control from the indicated classification that would address (prevent/detect/correct) the risk.a) A bank's customer database is hacked.Administrative: _____________________________________________
b) A careless employee spills coffee on a network server.Physical: _____________________________________________
c) A corporation's sales data are manipulated by a member of the sales staff.Technical: _____________________________________________
d) A former employee introduces a logic bomb to a company's payroll system.Administrative: _____________________________________________
e) A political candidate's web site is defaced.Technical: _____________________________________________
f) A senior citizen sends money to a fake religious organization based on a fraudulent e-mail.Administrative: _____________________________________________
g) A waitress steals a customer's credit card number.Physical: _____________________________________________
h) An employee uses work time to shop online using the company's computer.Administrative: _____________________________________________
i) Corporate spies steal research and development information.Technical: _____________________________________________
j) Fake compromising photos of a corporate CEO are posted to a social networking site.Technical: _____________________________________________
Correct Answer:

Verified
a.periodic password rotation
b.enclose t...View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Correct Answer:
Verified
b.enclose t...
View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Q20: COBIT's principles include the need to separate
Q21: COBIT's enablers include people, skills and competencies.According
Q22: According to ISACA, one of COBIT's enablers
Q23: The risk of disclosure of confidential information
Q24: COBIT's enablers include organizational structures.Based on ISACA's
Q26: All of the following are elements of
Q27: A firewall is an example of which
Q28: According to ISACA, which COBIT enabler focuses
Q29: According to COBIT 5, an organization's information
Q30: Computer crimes that fall under Carter's "target"