While reviewing sensitive electronic work papers, the IS auditor noticed that they were not encrypted. This could compromise the:
Which of the following will prevent dangling tuples in a database?
The technique used to ensure security in virtual private networks (VPNs) is:
When using a universal storage bus (USB) flash drive to transport confidential corporate data to an offsite location, an effective control would be to: