Pkg Acc Infor Systems MS VISIO CD
10th Edition
ISBN: 9781133935940
Author: Ulric J. Gelinas
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 11DQ
Summary Introduction
To discuss: Whether you agree on the above statement and describe some controls that might reduce the risk of data disclosure and loss from these devices.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(c) A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(i)To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem.
Is the following a potential control weakness?
A computer network and personal computers support Marco accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once.
Briefly explain the potential mistatement and recommended correction.
Chapter 8 Solutions
Pkg Acc Infor Systems MS VISIO CD
Ch. 8 - What are the four major categories of pervasive...Ch. 8 - What are the differences among a pervasive control...Ch. 8 - Prob. 3RQCh. 8 - Describe some compensating controls that can be...Ch. 8 - What are policy controls plans? How do policies...Ch. 8 - Why should an organization conduct monitoring...Ch. 8 - Prob. 8RQCh. 8 - Prob. 14RQCh. 8 - What are the major elements of the strategic IT...Ch. 8 - Prob. 16RQ
Ch. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Prob. 21RQCh. 8 - Prob. 22RQCh. 8 - Prob. 23RQCh. 8 - Prob. 24RQCh. 8 - Prob. 25RQCh. 8 - Prob. 26RQCh. 8 - Prob. 27RQCh. 8 - Prob. 28RQCh. 8 - Prob. 30RQCh. 8 - Prob. 31RQCh. 8 - Prob. 32RQCh. 8 - Prob. 33RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - No matter how sophisticated a system of internal...Ch. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 8DQCh. 8 - Prob. 9DQCh. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Prob. 11DQCh. 8 - Prob. 12DQCh. 8 - Prob. 13DQCh. 8 - Prob. 1SPCh. 8 - Prob. 2SPCh. 8 - Prob. 3SPCh. 8 - Listed here are 20 control plans discussed in the...Ch. 8 - Prob. 3PCh. 8 - Prob. 4PCh. 8 - Prob. 5PCh. 8 - Prob. 7P
Knowledge Booster
Similar questions
- Which of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.arrow_forwardSTUDY QUESTIONS Why is human behavior considered one of the biggest potential threats to operating system integrity? What are the issues that need to be considered before implementing keystroke monitoring? Describe the three ways on how an audit trail can be used to support security objectives. Explain how poorly designed audit trail logs can actually be dysfunctional. Why would a systems programmer create a back door if he or she has access to the program in his or her day-to-day tasks? PROBLEMS Problem 1: Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) can be used to help detect this type of fraud? Problem 2: In 2002, Mr. Rollerball started Mighty Mouse,…arrow_forwardListed here are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a preventive control.a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. (The user subsequently codes this information ontoa magnetic coding device and places this strip on a piece of cardboard.)b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled.c. Because of occasional noise on a transmission line, data being transferred is lost or garbled.d. An intruder is temporarily delaying important strategic messages over the telecommunications lines.e. An intruder is altering electronic messages before the user receives them.arrow_forward
- The increasing use of sophisticated EDP systems has produced significant changes in the accounting environment. The changes are: The potential for individuals to gain unauthorized access to data or assets may be greater in computerized accounting systems than in manual systems. Required: Discuss the impact on the internal control system and the independent audit.arrow_forwardYour organisation is disturbed that some staff members are clocking on for others who do not report for work. Recommend controls that will minimize this menace?arrow_forwardInternal controls are critical for any organization's risk of fraudulent activity. Additionally, new technology assists accountants in minimizing fraud. Demonstrate how an advanced technology transaction processing system may help any organization minimize fraudulent activity.arrow_forward
- Communication via the internet is fraught with major security problems. When it comes to Internet communications, which of these aspects poses the biggest security risk?arrow_forwardYour friend's small business is heavily dependent on information systems and needs to protect them at all costs. What are some of the information security threats and how should these risks be controlled?arrow_forwardExplain one gap the company has in internal control procedures in which fraud or errors could occur? What can the company do to prevent or detect this fraud or error? In your own words, explain the importance of internal control procedures.arrow_forward
- The use of information technology raises significant ethical issues such as computer crime, data security, privacy and so on. Computer ethics is the analysis of the nature and social impact of computer technology, as well as formulation of appropriate policies for the ethical use of such technology. The following statements address computer ethics, except :A. The company restricts access to external websites.B. Company policy to prevent the use of portable storage devices on work computers.C. Keep dan maintain software licenses legal and up-to-date.D. Enforces policies for employees who share information about customers on social media. Explain why you choose your answer, and not the other (in max 200 words).arrow_forwardThe ABC Company is switching from its legacy centralizedsystem to a fully distributed system. Underthe new model, all employees will work from PCsconnected to a local area network. a. Outline a plan of action to ensure that the propercontrols over hardware, software, data, people,procedures, and documentation are in place.b. Discuss any risks the company may face if thedevised plan is not implemented.arrow_forwardIs it an entity inherent risk for the information below? A computer network and personal computers support Marco Inc's accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once. If it is an inherent risk, what is the feature of the firm that will possibly affect inherent risk and explain how and why; that is whether it increases or decreases inherent risk. Please address a specific risk to the accuracy of the financial statements with the "how" and whether…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Business/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:Cengage
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage