Authentication and hacking controls at an environmental consulting company.
Required:
a. From the list of general controls shown in Exhibit 4-5, list each authentication and hacking control that you think the EnviroCons Company should have in place.
b. Explain how each control that you list can prevent IT related risks for EnviroCons.
c. Are there any general controls that you think would not be cost-beneficial?