An IS auditor analyzing the audit log of a database management system (DBMS) finds that some transactions were partially executed as a result of an error, and are not rolled back. Which of the following transaction processing features has been violated?
An organization's disaster recovery plan should address early recovery of:
When connecting to an organization's intranet from the Internet, security against unauthorized access is BEST achieved by using:
What is the BEST justification for allocating more funds to implement a control for an IT asset than the actual cost of the IT asset?