A non-human threat for computer systems is a flood. In which situation is a flood always a
relevant threat?
Your company is in the news as a result of an unfortunate action by one of your employees. The
phones are ringing off the hook with customers wanting to cancel their contracts. What do we call
this type of damage?
There is a network printer in the hallway of the company where you work. Many employees dont
pick up their printouts immediately and leave them in the printer. What are the consequences of
this to the reliability of the information?
In most organizations, access to the computer or the network is granted only after the user has
entered a correct username and password. This process consists of 3 steps: identification,
authentication and authorization. What is the purpose of the second step, authentication?
You own a small company in a remote industrial areA. Lately, the alarm regularly goes off in the middle of the night. It takes quite a bit of time to respond to it and it seems to be a false alarm every time. You decide to set up a hidden camerA. What is such a measure called?
You have just started working at a large organization. You have been asked to sign a code of
conduct as well as a contract. What does the organization wish to achieve with this?