Indicate whether each of the following statements is (i) always true, (ii) sometimes true, or (iii) never
Question:
a. A specific instance of computer crime can involve multiple categories from Carter’s taxonomy.
b. Computer crime involves using a computer to commit a crime.
c. Computer crime is perpetrated by organized crime groups.
d. Confidentiality, availability, and data integrity comprise the C-I-A triad.
e. Each element of the C-I-A triad is also mentioned in CoBIT’s information criteria.
f. Hackers may be motivated by profit or by entertainment.
g. Information technology controls can be physical, technical, or administrative.
h. Organizations that implement CoBIT are immune to computer crime.
i. Perpetrators of computer crime come from outside the organization.
j. The “salami technique” is an example of information manipulation.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Accounting Information Systems basic concepts and current issues
ISBN: 978-0078025334
3rd edition
Authors: Robert Hurt
Question Posted: