Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? An employees laptop was stolen at the airport. The laptop contained personal

Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats?

  1. An employees laptop was stolen at the airport. The laptop contained personal in- formation about the companys customers that could potentially be used to commit identity theft.

  2. A salesperson successfully logged into the payroll system by guessing the payroll supervisors password.

  3. Acriminalremotelyaccessedasensitivedatabaseusingtheauthenticationcredentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.

  4. An employee received an e-mail purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the e-mail to view the new policy, she infected her laptop with a keystroke logger.

  5. A companys programming staff wrote custom code for the shopping cart feature on its website. The code contained a buffer overflow vulnerability that could be ex- ploited when the customer typed in the ship-to address.

  6. A company purchased the leading off-the-shelf e-commerce software for linking its electronic storefront to its inventory database. A customer discovered a way to directly access the back-end database by entering appropriate SQL code.

  7. Attackers broke into the companys information system through a wireless access point located in one of its retail stores. The wireless access point had been purchased and installed by the store manager without informing central IT or security.

  8. An employee picked up a USB drive in the parking lot and plugged it into his laptop to see what was on it. As a result, a keystroke logger was installed on that laptop.

  9. Once an attack on the companys website was discovered, it took more than 30 min- utes to determine who to contact to initiate response actions.

  10. To facilitate working from home, an employee installed a modem on his office work- station. An attacker successfully penetrated the companys system by dialing into that modem.

  11. An attacker gained access to the companys internal network by installing a wireless access point in a wiring closet located next to the elevators on the fourth floor of a high-rise office building that the company shared with seven other companies.

The need to be 270 word

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Final Work On Internal Audit Internal Audit And Its Management

Authors: Silvia Mamani

1st Edition

6203099651, 978-6203099652

More Books

Students also viewed these Accounting questions

Question

Evaluate employees readiness for training. page 275

Answered: 1 week ago