SlideShare a Scribd company logo
1 of 1
Download to read offline
Chapter 11 Conrols for Information Security
11.4 Which preventive, detective, and/or corrective controls would best mitigate the following
threats?
a). An employee's laptop was stolen at the airport. The laptop contained personal information
about the company's customers that could potentially be used to commit identity theft.
b). A Salesperson succesfully logged into the payroll system by guessing the payroll supervisor's
password.
c). A criminal remotely accessed a sensitive database using the authentication credentials (user
ID and strong password) of an IT manager. At the time attack occurred, the IT manager was
logged into the system at his workstation at company headquarters.
d). An employee received an e-mail purporting to be from her boss informing her of an
important new attendance policy. When she clicked on a link embedded in the e-mail to view the
new policy, she infected her laptop with a keystroke logger.
e). A company's programming staff wrote custom code for the shopping cart feature on its
website. The code contained a buffer overflow vulnerability that could be exploited when the
customer typed in the ship-to address.
f). A company purchased the leading off-the-shelf e-commerce software for linking its electronic
storefront to its inventory database. A customer discovered a way to directly access the backend
data base by entering appropriate SQL code.
g). Attackers broke into the company's information system through a wireless access point
located in one of its retail stores. The wireless access point had been purchased and installed by
the store manager without informing central IT or security.
h). An employee picked up a USB drive in the parking lot and plugged it into his laptop to see
what was on it. As a result, a keystroke logger was installed on that laptop.
i). once an attack on the company's website was discovered, it took more than 30 minutes to
determine who to contact to initiate response actions.
j). To facilitate working from home, an employee installed a modem on his office workstation.
An attacker successfully penetrated the company's system by dialing into that modem.
k). An attacker gained access to the company's internal network by installing a wireless access
point in a wiring closet located next to the elevators on the fourth floor of a high-rise office
buliding that the company shared with seven other companies.

More Related Content

Similar to Chapter 11 Conrols for Information Security11.4 Which preventive, .pdf

GLOBAL FINANCE, INC. (GFI) Global Finance, Inc. (GFI.docx
 GLOBAL FINANCE, INC. (GFI)  Global Finance, Inc. (GFI.docx GLOBAL FINANCE, INC. (GFI)  Global Finance, Inc. (GFI.docx
GLOBAL FINANCE, INC. (GFI) Global Finance, Inc. (GFI.docx
aryan532920
 
Question 11 Which one of the following actions is not done .pdf
Question 11  Which one of the following actions is not done .pdfQuestion 11  Which one of the following actions is not done .pdf
Question 11 Which one of the following actions is not done .pdf
ynitin691
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
arri2009av
 
Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3
grimesjo
 
07029 Topic Final ProjectNumber of Pages 1 (Double Spaced).docx
07029 Topic Final ProjectNumber of Pages 1 (Double Spaced).docx07029 Topic Final ProjectNumber of Pages 1 (Double Spaced).docx
07029 Topic Final ProjectNumber of Pages 1 (Double Spaced).docx
smithhedwards48727
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgram
Taha Kachwala
 
HELLMANN FINANCE, INC. Hellmann Finance, Inc. (HFI) i.docx
HELLMANN FINANCE, INC.  Hellmann Finance, Inc. (HFI) i.docxHELLMANN FINANCE, INC.  Hellmann Finance, Inc. (HFI) i.docx
HELLMANN FINANCE, INC. Hellmann Finance, Inc. (HFI) i.docx
pooleavelina
 
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docxModule 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
audeleypearl
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
Leena Reddy
 

Similar to Chapter 11 Conrols for Information Security11.4 Which preventive, .pdf (20)

ProjectReport_Finalversion
ProjectReport_FinalversionProjectReport_Finalversion
ProjectReport_Finalversion
 
GLOBAL FINANCE, INC. (GFI) Global Finance, Inc. (GFI.docx
 GLOBAL FINANCE, INC. (GFI)  Global Finance, Inc. (GFI.docx GLOBAL FINANCE, INC. (GFI)  Global Finance, Inc. (GFI.docx
GLOBAL FINANCE, INC. (GFI) Global Finance, Inc. (GFI.docx
 
Industrie 4.0-security-4.0
Industrie 4.0-security-4.0Industrie 4.0-security-4.0
Industrie 4.0-security-4.0
 
Question 11 Which one of the following actions is not done .pdf
Question 11  Which one of the following actions is not done .pdfQuestion 11  Which one of the following actions is not done .pdf
Question 11 Which one of the following actions is not done .pdf
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
Heartlandpt3
Heartlandpt3Heartlandpt3
Heartlandpt3
 
07029 Topic Final ProjectNumber of Pages 1 (Double Spaced).docx
07029 Topic Final ProjectNumber of Pages 1 (Double Spaced).docx07029 Topic Final ProjectNumber of Pages 1 (Double Spaced).docx
07029 Topic Final ProjectNumber of Pages 1 (Double Spaced).docx
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgram
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
P0704085089
P0704085089P0704085089
P0704085089
 
HELLMANN FINANCE, INC. Hellmann Finance, Inc. (HFI) i.docx
HELLMANN FINANCE, INC.  Hellmann Finance, Inc. (HFI) i.docxHELLMANN FINANCE, INC.  Hellmann Finance, Inc. (HFI) i.docx
HELLMANN FINANCE, INC. Hellmann Finance, Inc. (HFI) i.docx
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
8. cyber51-case-studies
8. cyber51-case-studies8. cyber51-case-studies
8. cyber51-case-studies
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docxModule 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Information security
Information securityInformation security
Information security
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 

More from rahulfancycorner21

CLIENT APPLICATION Create a standalone, interactive, and fully com.pdf
CLIENT APPLICATION Create a standalone, interactive, and fully com.pdfCLIENT APPLICATION Create a standalone, interactive, and fully com.pdf
CLIENT APPLICATION Create a standalone, interactive, and fully com.pdf
rahulfancycorner21
 
Clara fears she may have made a mistake in how she handled the expen.pdf
Clara fears she may have made a mistake in how she handled the expen.pdfClara fears she may have made a mistake in how she handled the expen.pdf
Clara fears she may have made a mistake in how she handled the expen.pdf
rahulfancycorner21
 
Case 12�1Carson ManorIn late November, Ms. Elaine Taylor, direct.pdf
Case 12�1Carson ManorIn late November, Ms. Elaine Taylor, direct.pdfCase 12�1Carson ManorIn late November, Ms. Elaine Taylor, direct.pdf
Case 12�1Carson ManorIn late November, Ms. Elaine Taylor, direct.pdf
rahulfancycorner21
 
CASE STUDY 1 Alternative Water Supply Gordon Rivers, the city manage.pdf
CASE STUDY 1 Alternative Water Supply Gordon Rivers, the city manage.pdfCASE STUDY 1 Alternative Water Supply Gordon Rivers, the city manage.pdf
CASE STUDY 1 Alternative Water Supply Gordon Rivers, the city manage.pdf
rahulfancycorner21
 
Case 1 Why shareholders wealth maximization value maximization is c.pdf
Case 1 Why shareholders wealth maximization value maximization is c.pdfCase 1 Why shareholders wealth maximization value maximization is c.pdf
Case 1 Why shareholders wealth maximization value maximization is c.pdf
rahulfancycorner21
 
Capstone Project E-Commerce Application with Firebase Firestore Obj.pdf
Capstone Project E-Commerce Application with Firebase Firestore Obj.pdfCapstone Project E-Commerce Application with Firebase Firestore Obj.pdf
Capstone Project E-Commerce Application with Firebase Firestore Obj.pdf
rahulfancycorner21
 
C++ code, please help! RESPOND W COMPLETED CODE PLEASE, am using V.pdf
C++ code, please help! RESPOND W COMPLETED CODE PLEASE,  am using V.pdfC++ code, please help! RESPOND W COMPLETED CODE PLEASE,  am using V.pdf
C++ code, please help! RESPOND W COMPLETED CODE PLEASE, am using V.pdf
rahulfancycorner21
 
Can we please draw this BPM process roughly on paper and post a pict.pdf
Can we please draw this BPM process roughly on paper and post a pict.pdfCan we please draw this BPM process roughly on paper and post a pict.pdf
Can we please draw this BPM process roughly on paper and post a pict.pdf
rahulfancycorner21
 
Can we draw this BPM on paper showing shapes arrows and connectors .pdf
Can we draw this BPM on paper showing shapes arrows and connectors .pdfCan we draw this BPM on paper showing shapes arrows and connectors .pdf
Can we draw this BPM on paper showing shapes arrows and connectors .pdf
rahulfancycorner21
 
Can u give a CORAS ASSEST DIAGRAM for the following case study - The.pdf
Can u give a CORAS ASSEST DIAGRAM for the following case study - The.pdfCan u give a CORAS ASSEST DIAGRAM for the following case study - The.pdf
Can u give a CORAS ASSEST DIAGRAM for the following case study - The.pdf
rahulfancycorner21
 
C++ code, please help! Troubleshooting and cannot for the life of me.pdf
C++ code, please help! Troubleshooting and cannot for the life of me.pdfC++ code, please help! Troubleshooting and cannot for the life of me.pdf
C++ code, please help! Troubleshooting and cannot for the life of me.pdf
rahulfancycorner21
 

More from rahulfancycorner21 (19)

Consider a world in which there are two nations � the US and China, ea.pdf
Consider a world in which there are two nations � the US and China, ea.pdfConsider a world in which there are two nations � the US and China, ea.pdf
Consider a world in which there are two nations � the US and China, ea.pdf
 
Configure iptables to ACCEPT packets by defaultConfigure iptables .pdf
Configure iptables to ACCEPT packets by defaultConfigure iptables .pdfConfigure iptables to ACCEPT packets by defaultConfigure iptables .pdf
Configure iptables to ACCEPT packets by defaultConfigure iptables .pdf
 
CIS611 SS Chung Lab Assignment 2 Implementing Big Data Processing Pipe.pdf
CIS611 SS Chung Lab Assignment 2 Implementing Big Data Processing Pipe.pdfCIS611 SS Chung Lab Assignment 2 Implementing Big Data Processing Pipe.pdf
CIS611 SS Chung Lab Assignment 2 Implementing Big Data Processing Pipe.pdf
 
CLIENT APPLICATION Create a standalone, interactive, and fully com.pdf
CLIENT APPLICATION Create a standalone, interactive, and fully com.pdfCLIENT APPLICATION Create a standalone, interactive, and fully com.pdf
CLIENT APPLICATION Create a standalone, interactive, and fully com.pdf
 
Case Study Makati CityMakati City is one of the sixteen cit.pdf
Case Study Makati CityMakati City is one of the sixteen cit.pdfCase Study Makati CityMakati City is one of the sixteen cit.pdf
Case Study Makati CityMakati City is one of the sixteen cit.pdf
 
Clara fears she may have made a mistake in how she handled the expen.pdf
Clara fears she may have made a mistake in how she handled the expen.pdfClara fears she may have made a mistake in how she handled the expen.pdf
Clara fears she may have made a mistake in how she handled the expen.pdf
 
Case 12�1Carson ManorIn late November, Ms. Elaine Taylor, direct.pdf
Case 12�1Carson ManorIn late November, Ms. Elaine Taylor, direct.pdfCase 12�1Carson ManorIn late November, Ms. Elaine Taylor, direct.pdf
Case 12�1Carson ManorIn late November, Ms. Elaine Taylor, direct.pdf
 
CASE STUDY 1 Alternative Water Supply Gordon Rivers, the city manage.pdf
CASE STUDY 1 Alternative Water Supply Gordon Rivers, the city manage.pdfCASE STUDY 1 Alternative Water Supply Gordon Rivers, the city manage.pdf
CASE STUDY 1 Alternative Water Supply Gordon Rivers, the city manage.pdf
 
can i have the Answers of the above questions 1. Compare and contr.pdf
can i have the Answers of the above questions 1. Compare and contr.pdfcan i have the Answers of the above questions 1. Compare and contr.pdf
can i have the Answers of the above questions 1. Compare and contr.pdf
 
Case 1 Why shareholders wealth maximization value maximization is c.pdf
Case 1 Why shareholders wealth maximization value maximization is c.pdfCase 1 Why shareholders wealth maximization value maximization is c.pdf
Case 1 Why shareholders wealth maximization value maximization is c.pdf
 
Capstone Project E-Commerce Application with Firebase Firestore Obj.pdf
Capstone Project E-Commerce Application with Firebase Firestore Obj.pdfCapstone Project E-Commerce Application with Firebase Firestore Obj.pdf
Capstone Project E-Commerce Application with Firebase Firestore Obj.pdf
 
C++ code, please help! RESPOND W COMPLETED CODE PLEASE, am using V.pdf
C++ code, please help! RESPOND W COMPLETED CODE PLEASE,  am using V.pdfC++ code, please help! RESPOND W COMPLETED CODE PLEASE,  am using V.pdf
C++ code, please help! RESPOND W COMPLETED CODE PLEASE, am using V.pdf
 
Can you draw a database design Entity relationship ERand the rela.pdf
Can you draw a database design Entity relationship ERand the rela.pdfCan you draw a database design Entity relationship ERand the rela.pdf
Can you draw a database design Entity relationship ERand the rela.pdf
 
Business PlanA business plan is any simple plan, not only limited .pdf
Business PlanA business plan is any simple plan, not only limited .pdfBusiness PlanA business plan is any simple plan, not only limited .pdf
Business PlanA business plan is any simple plan, not only limited .pdf
 
Can we please draw this BPM process roughly on paper and post a pict.pdf
Can we please draw this BPM process roughly on paper and post a pict.pdfCan we please draw this BPM process roughly on paper and post a pict.pdf
Can we please draw this BPM process roughly on paper and post a pict.pdf
 
Can we draw this BPM on paper showing shapes arrows and connectors .pdf
Can we draw this BPM on paper showing shapes arrows and connectors .pdfCan we draw this BPM on paper showing shapes arrows and connectors .pdf
Can we draw this BPM on paper showing shapes arrows and connectors .pdf
 
Can u give a CORAS ASSEST DIAGRAM for the following case study - The.pdf
Can u give a CORAS ASSEST DIAGRAM for the following case study - The.pdfCan u give a CORAS ASSEST DIAGRAM for the following case study - The.pdf
Can u give a CORAS ASSEST DIAGRAM for the following case study - The.pdf
 
C++ code, please help! Troubleshooting and cannot for the life of me.pdf
C++ code, please help! Troubleshooting and cannot for the life of me.pdfC++ code, please help! Troubleshooting and cannot for the life of me.pdf
C++ code, please help! Troubleshooting and cannot for the life of me.pdf
 
BUsiness law9.3 Implied-in-Fact Contract For six years, Lee Marvin.pdf
BUsiness law9.3 Implied-in-Fact Contract For six years, Lee Marvin.pdfBUsiness law9.3 Implied-in-Fact Contract For six years, Lee Marvin.pdf
BUsiness law9.3 Implied-in-Fact Contract For six years, Lee Marvin.pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Chapter 11 Conrols for Information Security11.4 Which preventive, .pdf

  • 1. Chapter 11 Conrols for Information Security 11.4 Which preventive, detective, and/or corrective controls would best mitigate the following threats? a). An employee's laptop was stolen at the airport. The laptop contained personal information about the company's customers that could potentially be used to commit identity theft. b). A Salesperson succesfully logged into the payroll system by guessing the payroll supervisor's password. c). A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time attack occurred, the IT manager was logged into the system at his workstation at company headquarters. d). An employee received an e-mail purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the e-mail to view the new policy, she infected her laptop with a keystroke logger. e). A company's programming staff wrote custom code for the shopping cart feature on its website. The code contained a buffer overflow vulnerability that could be exploited when the customer typed in the ship-to address. f). A company purchased the leading off-the-shelf e-commerce software for linking its electronic storefront to its inventory database. A customer discovered a way to directly access the backend data base by entering appropriate SQL code. g). Attackers broke into the company's information system through a wireless access point located in one of its retail stores. The wireless access point had been purchased and installed by the store manager without informing central IT or security. h). An employee picked up a USB drive in the parking lot and plugged it into his laptop to see what was on it. As a result, a keystroke logger was installed on that laptop. i). once an attack on the company's website was discovered, it took more than 30 minutes to determine who to contact to initiate response actions. j). To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company's system by dialing into that modem. k). An attacker gained access to the company's internal network by installing a wireless access point in a wiring closet located next to the elevators on the fourth floor of a high-rise office buliding that the company shared with seven other companies.