Question

a. Use Carter’s taxonomy for computer crime to classify the case.
b. What business risk(s) / threat(s) are exemplified by it?
c. Which element(s) of the C-I-A triad was/were compromised in the case?
d. What internal controls would you recommend to address the problem?
e. Discuss elements of the CoBIT framework that are relevant to this case.


$1.99
Sales0
Views188
Comments0
  • CreatedAugust 06, 2015
  • Files Included
Post your question
5000