23.06.2016 Views

Unit 5 Discussion Topic 1 AUD Part I --

Unit 5 Discussion Topic 1 AUD Part I --

Unit 5 Discussion Topic 1 AUD Part I --

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Unit</strong> 5 <strong>Discussion</strong> <strong>Topic</strong> 1 <strong>AUD</strong> <strong>Part</strong> I --<br />

Download here<br />

<strong>Unit</strong> 5 <strong>Discussion</strong> <strong>Topic</strong> 1 <strong>AUD</strong> <strong>Part</strong> I -- The sharing of passwords can lead to viruses, lost or compromised information<br />

and a host of other IT security issues. If a program is considered vulnerable it can allow for things like backdoor outside<br />

entry and loss of system uptime. Program vulnerability should be detected by the audit IT specialists during the system<br />

audit. How can a company help ensure that they do not fall prey to program vulnerability? Provide specific details to<br />

support your opinion in your response.<br />

Page 1/{nb}

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!