Please match each item on the right to the most appropriate item on the left. 1. Confidentiality
Question:
1. Confidentiality
2. Creating fake refunds to benefit a friend
3. Data diddling
4. Human element
5. Incidental
6. Instrumentality
7. Logic bomb
8. Salami technique
9. Sarbanes-Oxley Act
10. Willful neglect
a. Computers used to carry out a crime
b. Crime classification that does not necessarily require a computer
c. Data are protected from unauthorized disclosure
d. Designed to help restore consumer confidence
e. Information manipulation
f. Intentionally changing information in a system
g. Interest of less than one cent diverted to computer criminal’s account
h. Most vulnerable part of an information system
i. One type of service interruption/delay
j. Shuts down a payroll system if a specific employee number is deleted
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Accounting Information Systems basic concepts and current issues
ISBN: 978-0078025334
3rd edition
Authors: Robert Hurt
Question Posted: