Examlex

Solved

In Each Statement That Follows, Circle the Business Risk or Threat

question 3

Essay

In each statement that follows, circle the business risk or threat that most clearly applies based on the list provided in the text.
A. Disclosure of confidential information or intrusion: Employee data are made available on the Internet.
B. DOS attacks or extortion: Prevent computer systems from functioning in accordance with their intended purpose.
C. Error or web site defacement: Digital graffiti
d. Fraud or error: Losses can vary widely depending on where the problem originated.
E. Information theft or information manipulation: An employee creates fake refunds to benefit a family member.
F. Intrusion or extortion: Main objective is to gain access to a network.
G. Intrusion or service interruption: Classified as accidental, willful neglect or malicious behavior.
H. Malicious software or information theft: Logic bombs, replicating worm, Trojan horse.
I. Service interruption or disclosure of confidential information: Can lead to missed deadlines for receivables or payables.j. Web site defacement or extortion: Criminal contacts an organization after successfully stealing information.


Definitions:

Impression Management

The process through which individuals attempt to control the perceptions others have of them, usually to appear more favorable or competent.

Upward Influence

refers to the ability of lower-level employees to affect the decisions, actions, and perspectives of their higher-up managers or leaders.

Hard Influence Tactics

Strategies that use direct and forceful approaches to persuade others, often involving pressure or threats.

Assertiveness

The quality of being self-assured and confident without being aggressive, enabling an individual to express their thoughts and feelings in a direct, honest manner.

Related Questions