The University of Sydney Page 5As long as a system performs any function, it is not possible to completely eliminate the potential for system failure resulting in information security breach.True.•System failures can occur in any system due to unauthorized or inappropriate operations such as Create, Read, Update or Delete. •Execution of these operations must have appropriate controls implemented within the system to ensure the confidentiality, integrity and availability of the information handled by the system. •A security breach can occur due to:i) failure to perform a function that should have been executed, orii) performanceofafunction that should not have been executed, oriii) performance of a functionthat produces an incorrect result.•Such breaches may be caused by errors inherent in the design of the system or those which may be attributed to unidentified vulnerabilities in the system. •Such occurrences therefore cannot be completely eliminated.