In each statement that follows, circle the business risk or threat that most cle
ID: 2596410 • Letter: I
Question
In each statement that follows, circle the business risk or threat that most clearly . applies based on the list provided in the text. a. Disclosure of confidential information or intrusion: Employee data are made available on the Internet. b. DOS attacks or extortion: Prevent computer systems from functioning in accordance with their intended purpose. c. Error or web site defacement: Digital graffiti. d. Fraud or error: Losses can vary widely depending on where the problem originated. e. Information theft or information manipulation: An employee creates fake refunds to benefit a family member. f. Intrusion or extortion: Main objective is to gain access to a network. Intrusion or service interruption: Classified as accidental, willful neglect or g. malicious behavior. h. Malicious software or information theft: Logic bombs, replicating worm, Trojan horse. i. Service interruption or disclosure of confidential information: Can lead to missed deadlines for receivables or payables. j. Web site defacement or extortion: Criminal contacts an organization after successfully stealing information. a. b. c. d.Explanation / Answer
a.intrusion
b.DOS attack
c.website defacement
d.error
e.information maipulation
f.extortion
g.service interruption
h.malicious software
i.disclosureof confidential information
j.extortion