Which of the following is not a risk specific to CIS environment ?       a.   reliance on the functioning capabilities of hardware and software.       b.   increased human involvement       c.   loss of data due to insufficient backup       d.   unauthorized access Required:     choose the correct answer and Justify your answers in at least 6 sentences.

Auditing: A Risk Based-Approach (MindTap Course List)
11th Edition
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Chapter3: Internal Control Over Financial Reporting: Responsibilities Of Management And The External Auditor
Section: Chapter Questions
Problem 20CYBK
icon
Related questions
Question

3.   Which of the following is not a risk specific to CIS environment ?
      a.   reliance on the functioning capabilities of hardware and software.
      b.   increased human involvement
      c.   loss of data due to insufficient backup
      d.   unauthorized access

Required:     choose the correct answer and Justify your answers in at least 6 sentences.

Expert Solution
steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Knowledge Booster
Types of cyber attacks
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Auditing: A Risk Based-Approach (MindTap Course L…
Auditing: A Risk Based-Approach (MindTap Course L…
Accounting
ISBN:
9781337619455
Author:
Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:
Cengage Learning
Accounting Information Systems
Accounting Information Systems
Accounting
ISBN:
9781337619202
Author:
Hall, James A.
Publisher:
Cengage Learning,