Question: Identify the risks, controls and control classification that arise in the following cases. . An employee's laptop was stolen at the airport. The laptop contained

Identify the risks, controls and control classification that arise in the following cases. . An employee's laptop was stolen at the airport. The laptop contained personally identifying information about the company's customers . A salesperson successfully logged into the payroll system by guessing the payroll supervisor' s password. . An employee picked up a USB drive in the parking lot and plugged it into their laptop to "see what was on it, " which resulted in a keystroke logger being installed on that laptop. . Once an attack on the company's website was discovered, it took more than 30 minutes to determine who to contact to initiate response actions. . A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters. Source: Romney, Marshall, et al. Accounting Information Systems Australasian Edition. Pearson Higher Education AU, 2012
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
