Consider the following examples of computer crime as you answer the question:
i.Social Security numbers are stolen from a company's database.ii.A fraudster uses a computer to identify people over the age of 80 with annual incomes of $250,000 or more.iii.A supervisor receives threats from a worker via e-mail; the worker demands promotion as a condition of not exposing the supervisor's illegal acts.iv.An unhappy customer launches a denial-of-service attack.Which of the following pairs an item from the list with an appropriate description of a business risk?
A) Extortion, i
B) Service interruption, ii
C) Extortion, iii
D) None of these
Correct Answer:
Verified
Q2: George received an e-mail that threatened to
Q3: The terms target, instrumentality, incidental and associated
Q4: According to Carter's taxonomy, use of a
Q5: Consider the following examples of computer crime
Q6: Business risks and threats to information systems
Q8: George received an e-mail that threatened to
Q9: According to COBIT's principles, information technology governance
Q10: Consider the following examples of computer crime
Q11: Computer crimes that fall under Carter's "target"
Q12: Which category of computer crime in Carter's
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents