100%(83)83 out of 83 people found this document helpful
This preview shows page 1 - 3 out of 27 pages.
Solutions to Chapters VIII and IX Homework Assignment8.4Which preventive, detective, and/or corrective controls would best mitigate the following threats?a.An employee’s laptop was stolen at the airport. The laptop contained personally identifying information about the company’s customers that could potentially be used to commit identity theft.b.A salesperson successfully logged into the payroll system by guessing the payrollsupervisor’s password.c.A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.