Monday 31 March 2014

Discussion Question 10: A bank in California has 13 branches spread throughout northern California, each with its own minicomputer where its data are stored. Another bank has ten branches spread throughout California, with the data being stored on a mainframe in San Francisco. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster?

Discussion Question 15: An organization’s internal audit department is usually considered an effective control mechanism for evaluating the organization’s internal control structure. Birch Company’s internal auditing function reports directly to the controller. Comment on the effectiveness of this organizational structure.

Problem 2 INTERNAL CONTROL Required: Identify the control weaknesses present and make a specific recommendation for correcting each of the control weaknesses.

CLICK HERE to get this paper!!

Problem 5 DISASTER RECOVERY PLAN:
Required:
a. Describe the computer security weaknesses present at Hill Crest Corporation that made it possible for a disastrous data loss.
b. List the components that should have been included in the disaster recovery plan at Hill Crest Corporation to ensure computer recovery within 72 hours.
c. What factors, other than those included in the plan itself, should a company consider when formulating a disaster recovery plan?

Problem 6: Per the article The Kiss of Identity Theft – Password Simplicity and Redundancy, which of the following statements is true?
I. Hackers who use powerful computers can break passwords containing dictionary words 100 times faster.
II. Adding just one capital letter and one asterisk would change the processing time (for a hacker) from 2.4 days to 2.1 centuries.

Both are true.
Neither are true.
I.
II.

CLICK HERE to get this paper!!

Review Question 1: Why is human behavior considered one of the biggest potential threats to operating system integrity?

Review Question 2: Why would a systems programmer create a back door if he or she has access to the program in his or her day- to- day tasks?

Chapter 16 Problem 4 INTERNAL CONTROL AND FRAUD
Required:
a. What weaknesses in the organization’s control struc-ture must have existed to permit this type of embez-zlement?
b. What specific control techniques and procedures could have helped prevent or detect this fraud?

Chapter 16 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a pre-ventive control.
a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. ( The user subsequently codes this information onto a magnetic coding device and places this strip on a piece of cardboard.)
b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled.
c. Because of occasional noise on a transmission line, data being transferred is lost or garbled.
d. An intruder is temporarily delaying important strategic messages over the telecommunications lines.
e. An intruder is altering electronic messages before the user receives them

No comments:

Post a Comment