Question: A Use Carter s taxonomy for computer crime to classify the

a. Use Carter’s taxonomy for computer crime to classify the case.
b. What business risk(s) / threat(s) are exemplified by it?
c. Which element(s) of the C-I-A triad was/were compromised in the case?
d. What internal controls would you recommend to address the problem?
e. Discuss elements of the CoBIT framework that are relevant to this case.

View Solution:


Sale on SolutionInn
Sales0
Views261
Comments
  • CreatedAugust 06, 2015
  • Files Included
Post your question
5000