Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In each statement that follows, circle the business risk or threat that most cle

ID: 2596410 • Letter: I

Question

In each statement that follows, circle the business risk or threat that most clearly . applies based on the list provided in the text. a. Disclosure of confidential information or intrusion: Employee data are made available on the Internet. b. DOS attacks or extortion: Prevent computer systems from functioning in accordance with their intended purpose. c. Error or web site defacement: Digital graffiti. d. Fraud or error: Losses can vary widely depending on where the problem originated. e. Information theft or information manipulation: An employee creates fake refunds to benefit a family member. f. Intrusion or extortion: Main objective is to gain access to a network. Intrusion or service interruption: Classified as accidental, willful neglect or g. malicious behavior. h. Malicious software or information theft: Logic bombs, replicating worm, Trojan horse. i. Service interruption or disclosure of confidential information: Can lead to missed deadlines for receivables or payables. j. Web site defacement or extortion: Criminal contacts an organization after successfully stealing information. a. b. c. d.

Explanation / Answer

a.intrusion

b.DOS attack

c.website defacement

d.error

e.information maipulation

f.extortion

g.service interruption

h.malicious software

i.disclosureof confidential information

j.extortion