Indicate whether each of the following statements is (i) always true, (ii) sometimes true, or (iii) never true. For those that are (ii) sometimes true, explain when the statement is true.
a. A specific instance of computer crime can involve multiple categories from Carter’s taxonomy.
b. Computer crime involves using a computer to commit a crime.
c. Computer crime is perpetrated by organized crime groups.
d. Confidentiality, availability, and data integrity comprise the C-I-A triad.
e. Each element of the C-I-A triad is also mentioned in CoBIT’s information criteria.
f. Hackers may be motivated by profit or by entertainment.
g. Information technology controls can be physical, technical, or administrative.
h. Organizations that implement CoBIT are immune to computer crime.
i. Perpetrators of computer crime come from outside the organization.
j. The “salami technique” is an example of information manipulation.

  • CreatedAugust 06, 2015
  • Files Included
Post your question