Question: For the following wrongdoing, first identify the computer fraud or abuse technique(s) used. Then propose three distinctive controls that the company could adopt to mitigate

For the following wrongdoing, first identify the computer fraud or abuse technique(s) used. Then propose three distinctive controls that the company could adopt to mitigate similar threats to system reliability in the future. If you identify the fourth distinctive control, you will receive ONE extra point. Be specific about the controls proposed and label them as preventative, detective, or corrective controls. Please use the text box to answer this question Daniel was the systems administrator for a company that manages customer information for their clients. He exceeded his authorized access and downloaded a file with 300 encrypted passwords, decrypted the password file, and then used the passwords to download customer files containing customers' personal information
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
