Explain the true statement about information security.
Answer to Problem 1CQ
Option b
Explanation of Solution
An organization is responsible for implementing strong information security control policies to manage the fraudulent activities. Firewalls, intrusion prevention systems, intrusion detection systems, and a Computer Incident Response Team (CIRT) are some of the information security control that provide defense-in-depth. These security controls need to be used in combination for better performance.
Information Technology is based on the security, confidentiality, privacy, processing integrity, and availability of information resources. Security becomes the primary component for attaining reliability. Information security controls are used for better performance of the organization.
Hence, option b is the correct answer and other options are incorrect.
Want to see more full solutions like this?
Chapter 8 Solutions
Accounting Information Systems (14th Edition)
- AccountingAccountingISBN:9781337272094Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.Publisher:Cengage Learning,Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Horngren's Cost Accounting: A Managerial Emphasis...AccountingISBN:9780134475585Author:Srikant M. Datar, Madhav V. RajanPublisher:PEARSONIntermediate AccountingAccountingISBN:9781259722660Author:J. David Spiceland, Mark W. Nelson, Wayne M ThomasPublisher:McGraw-Hill EducationFinancial and Managerial AccountingAccountingISBN:9781259726705Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting PrinciplesPublisher:McGraw-Hill Education