Consider the risk to “integrity of customer and financial data files on system” from “corruption of these files due to import of a worm/virus onto a system,” as discussed in Problem 14.2 (in attachment) in your textbook. From the list shown in Table 15.3 (in attachment) in your textbook, select some suitable specific controls that could reduce this risk. Indicate which you believe would be most cost effective. Support your answers with references.
Your well-written paper should meet the following requirements:
- Paper length: approx 3 pages
- Include an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.
- Include two external, scholarly references. Do not use blogs, wikis, or other non-scholarly sources.
- Include an introduction and conclusion