0 Comments

Question 1

3 out of 3 points

Review Question 1:
Why is human behavior considered one of the biggest potential threats to
operating system integrity?

Question 2

3 out of 3 points

Review Question 2:
Why would a systems programmer create a back door if he or she has
access to the program in his or her day- to- day tasks?

Question 3

4 out of 4 points

Chapter 16 Problem 4 INTERNAL CONTROL AND FRAUD

Required: a. What
weaknesses in the organization’s control struc-ture must have existed to permit
this type of embez-zlement?

b. What specific control techniques and procedures could
have helped prevent or detect this fraud?

Response Feedback: [None
Given]

Question 4

4 out of 4 points

Chapter 16 Problem 6 PREVENTIVE CONTROLS Listed here are
five scenarios. For each scenario, discuss the possible damages that can occur.
Suggest a pre-ventive control.

a. An intruder taps into a telecommunications device and
retrieves the identifying codes and personal identification numbers for ATM
cardholders. ( The user subsequently codes this information onto a magnetic
coding device and places this strip on a piece of cardboard.)

b. Because of occasional noise on a transmission line,
electronic messages received are extremely garbled.

c. Because of occasional noise on a transmission line, data
being transferred is lost or garbled.

d. An intruder is temporarily delaying important strategic
messages over the telecommunications lines.

e. An intruder is altering electronic messages before the
user receives them.

Order Solution Now

Categories: