Get premium membership and access questions with answers, video lessons as well as revision papers.
This is a careful study of an information system by experts in order to establish (or, find out) all the weaknesses in the system that could lead to security threats or act as weak access points for criminals.
An audit of the information system may seek to answer the following questions: -
1. Is the information system meeting all the design objectives as originally intended?
2. Have all the security measures been put in place to reduce the risk of computer crimes?
3. Are the computers secured in physically restricted areas?
4. Is there backup for data & information of the system that can ensure continuity of services even when something serious happens to the current system?
5. What real risks face the system at present or in future?
francis1897 answered the question on March 15, 2023 at 05:06
- State some of the ways of reducing piracy(Solved)
State some of the ways of reducing piracy
Date posted: March 14, 2023. Answers (1)
- What are the different ways tapping may take place?(Solved)
What are the different ways tapping may take place?
Date posted: March 14, 2023. Answers (1)
- Who is an hacker?(Solved)
Who is an hacker?
Date posted: March 14, 2023. Answers (1)
- Give the reasons for hacking(Solved)
Give the reasons for hacking
Date posted: March 14, 2023. Answers (1)
- Discuss the types of computer crimes.(Solved)
Discuss the types of computer crimes.
Date posted: March 14, 2023. Answers (1)
- What causes errors and accidental access to data and information?(Solved)
What causes errors and accidental access to data and information?
Date posted: March 14, 2023. Answers (1)
- Discuss the forms of unauthorized access(Solved)
Discuss the forms of unauthorized access
Date posted: March 14, 2023. Answers (1)
- In your own view, what are some of the intentions of the people who may want to access data without permission?(Solved)
In your own view, what are some of the intentions of the people who may want to access data without permission?
Date posted: March 14, 2023. Answers (1)
- State the types of destructions/damages caused by a virus attack(Solved)
State the types of destructions/damages caused by a virus attack
Date posted: March 14, 2023. Answers (1)
- What are the two tasks a virus (computer code) is designed to undertake?(Solved)
What are the two tasks a virus (computer code) is designed to undertake?
Date posted: March 14, 2023. Answers (1)