In auditing a web server, an IS auditor should be concerned about the risk of individuals gaining unauthorized access to confidential information through:
In auditing a web server, an IS auditor should be concerned about the risk of individuals gaining unauthorized access to confidential information through:
An organization can ensure that the recipients of e-mails from its employees can authenticate the identity of the sender by:
An organization can ensure that the recipients of e-mails from its employees can authenticate the identity of the sender by: