An IS auditor analyzing the audit log of a database management system (DBMS) finds that some transactions were partially executed as a result of an error, and are not rolled back. Which of the following transaction processing features has been violated?
Phishing attack works primarily through:
When responding to an ongoing Daniel of service (DoS) attack, an organization's FIRST course of action should be to:
An IS auditor is reviewing a software-based firewall configuration. Which of the following represents the GREATEST vulnerability? The firewall software:
Which of the following is the BEST reason to certify an organization to an international security standard?