Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

OUT REFERENCES MAILINGS REVIEW viEw ·B- ? Emphasis Heading 111Nornal Strong Subt

ID: 357071 • Letter: O

Question

OUT REFERENCES MAILINGS REVIEW viEw ·B- ? Emphasis Heading 111Nornal Strong Subtitle Paragraph Styles Directions Write the letters of the correct answer on the left hand line next to the question. One of the answers will be used twice. 1 . Salami Technique 2. COBIT 3. Logic bomb A. Most vulnerable part of an information system. B Computers used to carry out crimes. C. Intentionally changing information in a system. 4. Luddite D. A person opposed to increased industrialization or new technology. -5. Confidentiality E. Data are protected from unauthorized disclosure. 6. Instrumental F. Shuts down a payroll system if a specific employee number is deleted 7. Human Element G. Good practice framework created by intenational professional association ISACA for information technology (IT) management and IT gotemance 8. Data diddling

Explanation / Answer

B.1. Salami Technique (the exact definition of Salami Technique is not enlisted. It is the interest of less than one cent diverted to computer criminals account. Since the method is used by computer criminals, we have chosen option B)

G.2. COBIT is developed by ISACA

F.3. Logic bomb is known for shutting down a payroll system if a specific employee number is deleted

D.4. Luddite is a person opposed to new technology or ways of working

E.5. Confidentiality - Data is protected from unauthorized disclosure

B.6. Instrumentality - computers used to carry out a crime

A.7. Most vulnerable part of an information system is the Human element

C.8. Data diddling is intentionality changing the information in a system