This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: taking place or to suggest time passage. Information Technology (IT) Risks Computer Processing Area Risks Computer Operations Sabotage, natural disaster, viruses Computer Programs Fraudulent programming, processing fraudulent data, incomplete or incorrect data processing Data Files Unauthorized access -> destruction or manipulation of data, addition of fictitious data Data Communications Data is intercepted, modified, deleted or replaced with fraudulent data, hackers, denial of service attacks, unauthorized access...
View Full Document
This note was uploaded on 10/05/2011 for the course ACG 5637 taught by Professor Monikacaushoulli during the Fall '08 term at University of Florida.
- Fall '08