Accounting Information Systems
9th Edition
ISBN: 9781133934400
Author: James A. Hall
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 16, Problem 6P
a.
To determine
Describe the possible damages and preventive controls for the given scenario.
b.
To determine
Describe the possible damages and preventive controls for the given scenario.
c.
To determine
Describe the possible damages and preventive controls for the given scenario.
d.
To determine
Describe the possible damages and preventive controls for the given scenario.
e.
To determine
Describe the possible damages and preventive controls for the given scenario.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Listed here are two scenarios. For each scenario, discuss the possible damages that can occur.Suggest a preventive control.A. An intruder taps into a telecommunications device and retrieves the identifying codes andpersonal identification numbers for ATM cardholders. (The user subsequently codes thisinformation onto a magnetic coding device and places this strip on a blank bank card.)B. Because of occasional noise on a transmission line, electronic messages received are extremelygarbled.Problem # 4 (30
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(i)To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem.
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(c) A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.
Chapter 16 Solutions
Accounting Information Systems
Ch. 16 - Prob. 1RQCh. 16 - Prob. 2RQCh. 16 - Prob. 3RQCh. 16 - Prob. 4RQCh. 16 - Prob. 5RQCh. 16 - Explain discretionary access privileges.Ch. 16 - Prob. 7RQCh. 16 - Prob. 8RQCh. 16 - What is a vaccine, and what are its limitations?Ch. 16 - Prob. 10RQ
Ch. 16 - Prob. 11RQCh. 16 - What are the risks from equipment failure?Ch. 16 - Prob. 13RQCh. 16 - Prob. 14RQCh. 16 - Prob. 15RQCh. 16 - Prob. 16RQCh. 16 - Prob. 17RQCh. 16 - Prob. 18RQCh. 16 - Prob. 19RQCh. 16 - Prob. 20RQCh. 16 - Prob. 21RQCh. 16 - Prob. 22RQCh. 16 - Prob. 1DQCh. 16 - Prob. 2DQCh. 16 - Prob. 3DQCh. 16 - Prob. 4DQCh. 16 - Prob. 5DQCh. 16 - Prob. 6DQCh. 16 - Prob. 7DQCh. 16 - Prob. 8DQCh. 16 - Prob. 9DQCh. 16 - Prob. 10DQCh. 16 - Prob. 11DQCh. 16 - Prob. 12DQCh. 16 - Prob. 13DQCh. 16 - End-user computing has become extremely popular in...Ch. 16 - Prob. 15DQCh. 16 - Prob. 16DQCh. 16 - Prob. 17DQCh. 16 - Prob. 18DQCh. 16 - Prob. 19DQCh. 16 - Prob. 20DQCh. 16 - Prob. 21DQCh. 16 - Prob. 22DQCh. 16 - Prob. 23DQCh. 16 - Prob. 24DQCh. 16 - Prob. 25DQCh. 16 - Describe a digest within the context of a digital...Ch. 16 - What is a digital envelope?Ch. 16 - Prob. 28DQCh. 16 - Prob. 29DQCh. 16 - Prob. 30DQCh. 16 - Prob. 31DQCh. 16 - Discuss the unique control problems EDI creates.Ch. 16 - Prob. 33DQCh. 16 - Prob. 34DQCh. 16 - Prob. 1MCQCh. 16 - Prob. 2MCQCh. 16 - Prob. 3MCQCh. 16 - Prob. 4MCQCh. 16 - Prob. 5MCQCh. 16 - Prob. 6MCQCh. 16 - Prob. 7MCQCh. 16 - Prob. 8MCQCh. 16 - Prob. 9MCQCh. 16 - Prob. 10MCQCh. 16 - Prob. 1PCh. 16 - Prob. 2PCh. 16 - Prob. 3PCh. 16 - Prob. 4PCh. 16 - Prob. 5PCh. 16 - Prob. 6PCh. 16 - Prob. 7PCh. 16 - Prob. 8PCh. 16 - Better Business Company (BBC) is in the process of...Ch. 16 - Prob. 10PCh. 16 - Prob. 11PCh. 16 - Prob. 12PCh. 16 - Prob. 13P
Knowledge Booster
Similar questions
- The risk of fraud in a computerized system is lower than in a manual system because of the use of automated controls. true or falsearrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardExplains these controls and tell why they are important in any fraud situation: a. Preventive controls b. Detective controls c. Leveraging technologd. Identifying the red flags NB: Answer questions a-darrow_forward
- Types of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (h) Once an attack on the company’s website was discovered, it took more than 30 minutes to determine whom to contact to initiate response actions.arrow_forwardProvide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?arrow_forward
- The best protection for a company against telemarketing scams is: threatening to complain to law enforcement—then actually filing a complaint suing the fraudster prevention both a and barrow_forward1. Automated controls in a computerized system are always more reliable than manual controls. true or false 2. The risk of fraud in a computerized system is lower than in a manual system because of the use of automated controls. 3. What is a potential risk associated with computerized systems? a. Inefficient use of resources b. Unauthorized access to data c. Excessive use of paper-based documents d. Lack of user training 4. The use of computer systems in financial reporting increases the risk of material misstatements. true or false 5. Which of the following is a potential limitation of computer-based systems? a. Increased risk of data loss b. Reduced need for user training c. Reduced need for internal controls d. Increased efficiency and accuracyarrow_forward“Organizations are encouraged to take every precaution possible to protect their information systems so that potential for fraud and any resulting losses can be significantly minimized.” Required: Critically explain any three motives behind the cheque fraud scheme. What to do if someone has deposited a fake cheque into your bank account?arrow_forward
- Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (e)A company’s programming staff wrote custom code for the shopping cart feature on its website. The code contained a vulnerability that could be exploited when the customer typed in the ship-to address.arrow_forward“Identity theft is often applied to a wide range of crimes, including checking account fraud, counterfeiting, forgery, auto theft using false documentation, trafficking in human beings, and terrorism, most policymakers, and researchers agree that identity theft includes the misuse of another individual’s personal information to commit fraud”. Required: Where does identity theft fraud happen often? Explain any five steps that victims should need to take once identity theft occurs.arrow_forwardIdentify two to three (2-3) information technology tools that affect privacy. Next, discuss the main way in which one would use the tools that you have identified to commit computer crimes. Provide a rationale to support your responsearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,