Name five types of security threats

What will be an ideal response?


Any combination of the following.

Viruses
Laptop or mobile hardware theft
Insider abuse of Net access or e-mail
Unauthorized access to information
Denial of service
System penetration
Abuse of wireless network
Theft of proprietary information
Financial Fraud
Telecom fraud
Misuse of public Web application
Web site defacement
Sabotage

Business

You might also like to view...

The ______________________________ officer possesses expertise in generally accepted accounting principles

Fill in the blank(s) with correct word

Business

Back Company sold merchandise on credit. Its gross profit ratio is 23%. The effect of this transaction is that the

a. earnings per share decreased b. current ratio was unchanged c. debt-to-equity ratio increased d. earnings per share increased

Business

If you were to ask a sample of marketing researchers today what their biggest concern is, it would no doubt be "the future economy."

Indicate whether the statement is true or false

Business

The most important message in the Johari Window theory is that

a. trust and openness lead to better communication between people. b. there are things we don't know about ourselves that others know. c. people engage in communication in hopes that the outcome may lead to mutual trust, pleasure, and psychological well-being. d. decision-making power should be distributed to the people closest to the problem.

Business