There are 12 general categories of threat to an organization's people, information, and systems. List at least six of the general categories of threat and identify at least one example of those listed.

What will be an ideal response?

Compromises to intellectual propertySoftware attacksDeviations in quality of serviceEspionage or trespassForces of natureHuman error or failureInformation extortionSabotage or vandalismTheftTechnical hardware failures or errorsTechnical software failures or errorsTechnological obsolescence

Computer Science & Information Technology

You might also like to view...

The selection exchange sort:

a. Finds the smallest value and exchanges it with the first value, then continues with the second value, third value, etc. b. Is a system of comparisons and exchanges of adjacent elements to move the largest to the bottom of the selected group of values. c. Is a system of comparisons and exchanges of elements that are non-adjacent. The gap is halved at each pass. d. None of the above.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The Knights of Labor is generally considered an example of an "uplift union" due to its mission to elevate the moral, intellectual, and social lives of workers. 2. The Knights of Labor was an exclusive union that allowed only certain types of workers to join its ranks while not allowing other types of workers (e.g., women and minorities) to join. 3. The ultimate goal of the Knights of Labor was to replace capitalism with producer cooperatives. 4. The Knights of Labor was a militant union that advocated the use of strikes and boycotts as weapons that would force management to concede to their demands. 5. The central conflict for the Knights of Labor was not with business owners, but rather with those who were perceived as controlling wealth, without actually producing it.

Computer Science & Information Technology