Accounting Information Systems
Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
Question
Book Icon
Chapter 9, Problem 2SP

1)

Summary Introduction

To determine: Whether anyone can read the message.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

1)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  1

Here,

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether anyone can read the message:

Not everyone can read the message. Only the person who has the private key of Person S can be able to open the message.

2)

Summary Introduction

To determine: Whether Person S can be sure that the message is from Person H.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

2)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  2

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether Person S can be sure that the message is from Person H:

Anyone with the public key of Person S can be able to send the message

3)

Summary Introduction

To determine: Whether digital signature message is secret.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

3)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  3

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether a digital signature message is secret:

Anyone with the public key of Person H can be able to open the digital signature message.

4)

Summary Introduction

To determine: Whether someone other than Person H can send the digital signature message.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

4)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  4

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether someone other than Person H can send the digital signature message:

A person with the private key of Person H can be able to send the digital signature message.

5)

Summary Introduction

To determine: How Person S know that the message has not been corrupted in transit.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

5)

Expert Solution
Check Mark

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  5

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine how Person S know that the message has not been corrupted in transit:

If the hash total of digital signature equals the hash total that Person S calculated from the message then the message has not been corrupted in transit.

6)

Summary Introduction

To determine: The sub-part that is related to authenticity.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

6)

Expert Solution
Check Mark

Explanation of Solution

Determine the subpart that is related to authenticity:

Subpart (2) and Subpart (4) are about authenticity.

7)

Summary Introduction

To determine: The sub-part that is related to integrity.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

7)

Expert Solution
Check Mark

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  6

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine the subpart that is related to integrity:

Subpart (5) is about integrity.

8)

Summary Introduction

To determine: The sub-part that is related to confidentiality.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

8)

Expert Solution
Check Mark

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  7

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine the subpart that is related to confidentiality:

Subpart (1) and Subpart (3) are about the confidentially.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (c) A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.
Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true? a. The type of computer fraud that is simplest and most common and that requires the least amount of skill is data b. The type of computer fraud that is the most difficult because it requires the most skill is computer instructions fraud c. The biggest cause of data breaches is organized by hacker groups. d. Losses from the theft of physical assets are much greater than those from the electronic theft of data e. In the absence of controls, it is not hard for a dishonest employee to steal data.
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (j) An attacker gained access to the company’s internal network by installing a wireless access point in a wiring closet located next to the elevators on the fourth floor of a high-rise office building that the company shared with other companies.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Text book image
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Text book image
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College