What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
erability inherent with that component. Also describe what a threat agent might do to exploit that vulnerability.
1 answer:
People, procedures and instructions, data, software, information technology infrastructure, internal controls.
You might be interested in
When forced distribution is used to reduce leniency bias, this can cause <decreased trust> between employees if a pfp system is in place.
Answer:
No
Explanation:
You had the whole week for the essay but didn't do it and then turned it in late.
It’s jelly like fluid surrounds the nucleus