preview

Using Kerberos Integrated Windows Authentication Adapters

Better Essays

1) One principle of error reduction is to reuse information already in the computer whenever possible. Describe an experience where you had to re-input information that should have been stored and reusable.

From my experiences as a software developer, reuse of information already existing in the computer can exist in situations such as logging into different applications using the same user id. For example, I had to sign in to my windows workstation and then again sign into different applications like sales force, security central, IBM web sphere administration server console etc.. This was time consuming and also annoying. I had to re-input my employee ID into all the above applications and had to sign in before using them. Currently, …show more content…

The product of ad hoc analysis is typically a statistical model and a analytic report (Ad Hoc Analysis, n.d.). They are also used to create a report that drill deeper into the static report to get details about the accounts or records.
The main goal of ad hoc reporting is to empower end users to ask their own questions of the company data. Ad hoc reporting stands in contrast with managed reporting, in which the technical user and the report developer create and distribute the report (Ad Hoc Reporting, n.d.).

3) Discuss why both manual procedures and computer integrity controls are required to prevent fraud.

Computer Integrity controls include processing control on application programs, network access security on browser and internet transport, input and output controls on input and output devices, operating system security, data encryption over data and internet transport. Manual procedures include physically counting stuff, checking transactions manually, checking consistencies between two related things, random checks etc.

Following are the factors affecting fraud risks and tips to counter these factors (Procedure Manual, 2013):
Separation of duties- it is countered by creating separated forms, access controls for all tasks of requesting, approving and generating expenditures. This technique uses control on application programs.
Inadequate audit trails- for this, transaction logging is to be included and also ability of manipulating

Get Access