Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

irktors (lcloding his accoueting instructor thmivenity c. All students (inc ludi

ID: 2391501 • Letter: I

Question

irktors (lcloding his accoueting instructor thmivenity c. All students (inc luding Ti) and Tim's accounting iesirwsor cely d. All students (inclading Tim) and all instractors (inctuding Tim's accouming inseructor) a 11. Statement evaluation. Indicate whether each of the follkowing tatements is 0) always true, (i) sometimes true, or (iii) never true. For those that are (i) sometimes true, explain when the statement is true. a A specific istance of computer crime can involve maliple categories from Carner's taxonomy b. Computer crime isvelves using a computee to commiz a crime. eComputer erime is perpetratied by organised crime groupe d. Confidentiality, availability, and data integrity comprise the C-J-A triad c. Each element of the C-L-A triad is also mestioned in Collts seven enablers t. Although sot an asset in the accounting sense, information is a resource according to CoBITs seven enablers. Information technology costrols can be physical, technical, or administrative. h. Organizations that implemest CoBIT are immune to commputer crime i. Perpetratons of computer crime come from outside the organiration J. The "salami technigse" is an cxample of infomation manipalation

Explanation / Answer

(i) always true

Computer crime is perpetrated by organized crime groups who has knowledge in the use of computers.

Perpetrators means a person who carries out a illegal, harmful and immoral act can be either from inside or outside from the organization