Name five types of security threats
What will be an ideal response?
Any combination of the following.
Viruses
Laptop or mobile hardware theft
Insider abuse of Net access or e-mail
Unauthorized access to information
Denial of service
System penetration
Abuse of wireless network
Theft of proprietary information
Financial Fraud
Telecom fraud
Misuse of public Web application
Web site defacement
Sabotage
You might also like to view...
The ______________________________ officer possesses expertise in generally accepted accounting principles
Fill in the blank(s) with correct word
Back Company sold merchandise on credit. Its gross profit ratio is 23%. The effect of this transaction is that the
a. earnings per share decreased b. current ratio was unchanged c. debt-to-equity ratio increased d. earnings per share increased
If you were to ask a sample of marketing researchers today what their biggest concern is, it would no doubt be "the future economy."
Indicate whether the statement is true or false
The most important message in the Johari Window theory is that
a. trust and openness lead to better communication between people. b. there are things we don't know about ourselves that others know. c. people engage in communication in hopes that the outcome may lead to mutual trust, pleasure, and psychological well-being. d. decision-making power should be distributed to the people closest to the problem.