QUESTION 1: Who are the potential victims of an organization’s data breach?
QUESTION 2: What is social engineering? Give an example.
QUESTION 3: Explain how identity theft can occur.
QUESTION 4: List benefits of e-business. What are the major types of e-business transactions?
QUESTION 5: What is the advantage of using cloud computing as the platform for e-government?