Question: Ellen ar drie Which preventive, detective, and/or corrective controls would best mitigate the follow ing threats? 3. An employee's laptop was stolen at the airport.

 Ellen ar drie Which preventive, detective, and/or corrective controls would best

mitigate the follow ing threats? 3. An employee's laptop was stolen at

Ellen ar drie Which preventive, detective, and/or corrective controls would best mitigate the follow ing threats? 3. An employee's laptop was stolen at the airport. The laptop contained personal in formation about the company's customers that could potentially be used to commit identity theft. A salesperson successfully logged into the payroll system by guessing the payroll supervisor's password c. A criminal remotely accessed a sensitive database using the authentication credentials fuser ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters CONTROL AND AUDIT OF ACCOUNTING INFORMATION SYSTEMS be from her boss informing her rink embedded in the mount the shopping cart feature nerability that could be mmerce software for linking scovered a way to An employee recere an e-mail purporting to be from her bal important new attendance Ry When she chicked on a link to view the new policy, she infected her laptop with a keystroke A cam p opramming sal wote custom code for the he on its website. The code contained a buffer overflow vulnerability ploited when the customer typed in the ship to address A company purchased the leading "off-the-shelf e-commerce softu its electronie storefront to its inventory database. A cust directly access the back-end database by entering appropriate SOL code Attackers broke into the company's information system through a point located in one of its retail stores. The wireless access point had and installed by the store manager without informing central IT or securi h. An employee picked up a USB drive in the parking lot and plugged it into to see what was on it." As a result, a keystroke logger was installed on the i Once an attack on the company's website was discovered it took more than utes to determine who to contact to initiate response actions, To facilitate working from home, an employee installed a modem on his office station. An attacker successfully penetrated the company's system by dialinen through a wireless acces cess point had been purchased plugged it into his laptop installed on that laptop ook more than 30 min that modem. An attacker gained access to the company's internal network by installing a wirele access point in a wiring closet located next to the elevators on the fourth floor of high rise office building that the company shared with seven other companies

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!

Q:

\f