Question
An employees laptop was stolen at the airport. The laptop contained personally identifying information about the companys customers A salesperson successfully logged into the payroll
-
An employees laptop was stolen at the airport. The laptop contained personally identifying information about the companys customers
-
A salesperson successfully logged into the payroll system by guessing the payroll supervisorspassword.
-
An employee picked up a USB drive in the parking lot and plugged it into their laptop to "see what was on it, which resulted in a keystroke logger being installed on that laptop.
-
Once an attack on the companys website was discovered, it took more than 30 minutes to determine who to contact to initiate response actions.
-
A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.
In the table below:
-
(a) Identify five (5) risks present in the previously listed activities.
-
(b) Recommend a control for each of the risks you identified.
3- (c) Classify each of the control activities as preventive, detective, or corrective
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started