What are the six critical components of an information system? Select three of the six components, and describe a potential vulnerability inherent with that component. Also describe what a threat agent might do to exploit that vulnerability.

Respuesta :

people, procedures and instructions, data, software, information technology infrastructure, internal controls.