term1 Definition1term2 Definition2term3 Definition3
Please sign in to your Google account to access your documents:
• Theft, damage or destruction of computer systems.
• Corruption or destruction of corporate data.
• Leakage of sensitive information to rivals.
• Stealing private information for employees, customers or partners.
• Damage to the reputation of an organisation.
• Denial of service that can cause business loss.
Types of harm that can affect the computing environment:
• Information need to be accurate.
• Information need to be complete.
• Information need to be timely.
In order for the computing environment to be valuable to an organization or company:
People , System activities , Data , Technology , Network
The Computing Environment
Need help typing ? See our FAQ (opens in new window)
Please sign in to create this set. We'll bring you back here when you are done.
Discard Changes Sign in
Please sign in to add to folders.
Sign in
Don't have an account? Sign Up »
You have created 2 folders. Please upgrade to Cram Premium to create hundreds of folders!