Essay
In each statement that follows, circle the business risk or threat that most clearly applies based on the list provided in the text.
a.Disclosure of confidential information or intrusion: Employee data are made available on the Internet.
b.DOS attacks or extortion: Prevent computer systems from functioning in accordance with their intended purpose.
c.Error or web site defacement: Digital graffiti.
d.Fraud or error: Losses can vary widely depending on where the problem originated.
e.Information theft or information manipulation: An employee creates fake refunds to benefit a family member.
f.Intrusion or extortion: Main objective is to gain access to a network.
g.Intrusion or service interruption: Classified as accidental, willful neglect or malicious behavior.
h.Malicious software or information theft: Logic bombs, replicating worm, Trojan horse.
i.Service interruption or disclosure of confidential information: Can lead to missed deadlines for receivables or payables.
j.Web site defacement or extortion: Criminal contacts an organization after successfully stealing information.
Correct Answer:

Verified
a.disclosure of confidential information...View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Correct Answer:
Verified
View Answer
Unlock this answer now
Get Access to more Verified Answers free of charge
Q34: WER Corporation forces its employees to change
Q35: A bank's information system was hacked in
Q36: According to COBIT 5, an organization's information
Q37: Carter suggested a four-part taxonomy for classifying
Q38: According to COBIT's principles, information technology governance
Q40: Carter suggested a four-part taxonomy for classifying
Q41: Which of the following best pairs a
Q42: COBIT's enablers include principles, policies and frameworks.Which
Q43: Ethan is an information technology security consultant.He
Q44: According to COBIT 5, an organization's information