Question
Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? An employees laptop was stolen at the airport. The laptop contained personal
Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats?
-
An employees laptop was stolen at the airport. The laptop contained personal in- formation about the companys customers that could potentially be used to commit identity theft.
-
A salesperson successfully logged into the payroll system by guessing the payroll supervisors password.
-
Acriminalremotelyaccessedasensitivedatabaseusingtheauthenticationcredentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.
-
An employee received an e-mail purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the e-mail to view the new policy, she infected her laptop with a keystroke logger.
-
A companys programming staff wrote custom code for the shopping cart feature on its website. The code contained a buffer overflow vulnerability that could be ex- ploited when the customer typed in the ship-to address.
-
A company purchased the leading off-the-shelf e-commerce software for linking its electronic storefront to its inventory database. A customer discovered a way to directly access the back-end database by entering appropriate SQL code.
-
Attackers broke into the companys information system through a wireless access point located in one of its retail stores. The wireless access point had been purchased and installed by the store manager without informing central IT or security.
-
An employee picked up a USB drive in the parking lot and plugged it into his laptop to see what was on it. As a result, a keystroke logger was installed on that laptop.
-
Once an attack on the companys website was discovered, it took more than 30 min- utes to determine who to contact to initiate response actions.
-
To facilitate working from home, an employee installed a modem on his office work- station. An attacker successfully penetrated the companys system by dialing into that modem.
-
An attacker gained access to the companys internal network by installing a wireless access point in a wiring closet located next to the elevators on the fourth floor of a high-rise office building that the company shared with seven other companies.
The need to be 270 word
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started