Question
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective, and/or corrective control procedures. Please write your answers in
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective, and/or corrective control procedures. Please write your answers in well-developed, complete sentences.
The VP of Sales, Carol, has sent you an email relating to her suspicions and would like for you to respond:
I dont want to sound paranoid, but it seems like we are getting beat out of our electronic contract bids by the same company each and every time. I dont think we have an inside mole in our department, I know we have been really tight on authentication and authorization controls when it comes to our contract bidding as its only me and one other person that does this. Can you tell if someone is able to either break into our system to get these files or is intercepting them at all? What are the controls that we can put in place to really ensure that this does not happen?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started