what is the potential consequences and give each of the question a prevention technique. 1)A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. 2)Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. 3)Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at home, which he also used at his office when connecting to the company’s network. The program contained a virus that spread to the company’s mainframe. 4)Harry, a trusted employee and a system engineer, had access to both the network access control list and user passwords. The firm’s competitor recently hired him for a large increase in salary. After leaving, Harry continued to browse through his old employer’s data, such as price lists, customer lists, bids on jobs, and so on. He passed this information on to his new employer.

Pkg Acc Infor Systems MS VISIO CD
10th Edition
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:Ulric J. Gelinas
Chapter14: The Human Resources (hr) Management And Payroll Processes
Section: Chapter Questions
Problem 4SP
icon
Related questions
Question

what is the potential consequences and give each of the question a prevention technique.

1)A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks.

2)Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file.

3)Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at home, which he also used at his office when connecting to the company’s network. The program contained a virus that spread to the company’s mainframe.

4)Harry, a trusted employee and a system engineer, had access to both the network access control list and user passwords. The firm’s competitor recently hired him for a large increase in salary. After leaving, Harry continued to browse through his old employer’s data, such as price lists, customer lists, bids on jobs, and so on. He passed this information on to his new employer.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Types of cyber attacks
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Pkg Acc Infor Systems MS VISIO CD
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:
9781133935940
Author:
Ulric J. Gelinas
Publisher:
CENGAGE L
Accounting Information Systems
Accounting Information Systems
Accounting
ISBN:
9781337619202
Author:
Hall, James A.
Publisher:
Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L…
Auditing: A Risk Based-Approach (MindTap Course L…
Accounting
ISBN:
9781337619455
Author:
Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:
Cengage Learning