CIMA and Compromise: Difference between pages
From ACT Wiki
(Difference between pages)
imported>Doug Williamson (Links ordering.) |
imported>Doug Williamson (Create page. Sources: Linked pages.) |
||
Line 1: | Line 1: | ||
1. ''Security - cyber crime - confidentiality''. | |||
To weaken, expose to risk or threat, or breach confidentiality. | |||
:<span style="color:#4B0082">'''''Huge range of cybercrime'''''</span> | |||
:"Fraudsters go for easy targets. If there are obvious weak spots in a company's digital security, they will exploit them. | |||
:There is a huge range of types of cybercrime, ranging from attempts to compromise an entire business's operations, to simple scams aimed at exploiting the vulnerability of customers and staff." | |||
:''Cybercrime – A Threat And An Opportunity - the Treasurer's Wiki.'' | |||
2. ''Agreement - settlement - concession''. | |||
To reach a settlement or agreed position, usually following discussion or negotiation, and concessions by each of the parties to the settlement or agreement. | |||
3. ''Noun''. | |||
The act - or the result - of compromising. | |||
:<span style="color:#4B0082">'''''Working capital management is a compromise'''''</span> | |||
:"As a result, the management of working capital is essentially a compromise between levels high enough for smooth commercial operation and safeguarding reputation, and levels low enough to be financially efficient." | |||
:''Working capital management - the Treasurer's Wiki.'' | |||
== See also == | == See also == | ||
* [[ | * [[Balance]] | ||
* [[ | * [[Business email compromise]] | ||
* [[ | * [[Confidentiality]] | ||
* [[ | * [[Credential compromise]] | ||
* [[ | * [[Cybercrime]] | ||
* [[ | * [[Cybercrime – A Threat And An Opportunity]] | ||
* [[Cyber security: protecting your business and your clients]] | |||
* [[Dynamic balance]] | |||
* [[Reputational risk]] | |||
* [[Strong Customer Authentication]] | |||
* [[Transaction risk analysis]] | |||
* [[Two-factor authentication]] | |||
* [[Working capital management]] | |||
[[Category: | [[Category:Accounting,_tax_and_regulation]] | ||
[[Category: | [[Category:The_business_context]] | ||
[[Category:Identify_and_assess_risks]] | |||
[[Category:Manage_risks]] | |||
[[Category:Risk_frameworks]] | |||
[[Category:Risk_reporting]] | |||
[[Category:Cash_management]] | |||
[[Category:Financial_products_and_markets]] | |||
[[Category:Liquidity_management]] |
Latest revision as of 20:25, 17 November 2022
1. Security - cyber crime - confidentiality.
To weaken, expose to risk or threat, or breach confidentiality.
- Huge range of cybercrime
- "Fraudsters go for easy targets. If there are obvious weak spots in a company's digital security, they will exploit them.
- There is a huge range of types of cybercrime, ranging from attempts to compromise an entire business's operations, to simple scams aimed at exploiting the vulnerability of customers and staff."
- Cybercrime – A Threat And An Opportunity - the Treasurer's Wiki.
2. Agreement - settlement - concession.
To reach a settlement or agreed position, usually following discussion or negotiation, and concessions by each of the parties to the settlement or agreement.
3. Noun.
The act - or the result - of compromising.
- Working capital management is a compromise
- "As a result, the management of working capital is essentially a compromise between levels high enough for smooth commercial operation and safeguarding reputation, and levels low enough to be financially efficient."
- Working capital management - the Treasurer's Wiki.
See also
- Balance
- Business email compromise
- Confidentiality
- Credential compromise
- Cybercrime
- Cybercrime – A Threat And An Opportunity
- Cyber security: protecting your business and your clients
- Dynamic balance
- Reputational risk
- Strong Customer Authentication
- Transaction risk analysis
- Two-factor authentication
- Working capital management