Discuss corrective controls would best mitigate threats

Assignment Help Accounting Basics
Reference no: EM132450490 , Length: 3

Question 1: Which preventive, detective, and/or corrective controls would best mitigate the following threats?

a) An employee's laptop was stolen at the airport. The laptop contained personal information about the company's customers that could potentially be used to commit identity theft.

b) A salesperson successfully logged into the payroll system by guessing the payroll supervisor's password.

c) A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. Atthe time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.

d) An employee received an e-mail purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the e-mail to view the new policy, she infected her laptop with a keystroke logger.

e) A company's programming staff wrote custom code for the shopping cart feature on its website. The code contained a buffer overflow vulnerability that could be exploited when the customer typed in the ship-to address.

f) A company purchased the leading "off-the-shelf" e-commerce software for linking its electronic storefront to its inventory database. A customer discovered a way to directly access the back-end database by entering appropriate SQL code.

g) Attackers broke into the company's information system through a wireless access point located in one of its retail stores. The wireless access point had been purchased and installed by the store manager without informing central IT or security.

h) An employee picked up a USB drive in the parking lot and plugged it into his laptop to "see what was on it." As a result, a keystroke logger was installed on that laptop.

i) Once an attack on the company's website was discovered, it took more than 30 minutes to determine who to contact to initiate response actions.

j) To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company's system by dialing into that modem.

k) An attacker gained access to the company's internal network by installing a wireless access point in a wiring closet located next to the elevators on the fourth floor of a high-rise office building that the company shared with seven other companies

Reference no: EM132450490

Questions Cloud

What is the main mechanism : What is the main mechanism by which the lower atmosphere of Earth is heated?
Describe expenditure cycle case analysis : What are the threats that may face production operations and what could be the possible controls for those threats? Describe Expenditure cycle case analysis
Creation of a single elliptical galaxy : What evidence supports the idea that a collision between two spiral galaxies might lead to the creation of a single elliptical galaxy?
Prepare year-end adjusting entries for transactions : Prepare year-end adjusting entries for transactions 1 to 3 and the required entry for transaction 4.company's chief accountant to fill a long-standing vacancy.
Discuss corrective controls would best mitigate threats : An employee's laptop was stolen at the airport. The laptop contained personal information about the company's customers that could potentially
What fraction of its mass would io lose in billion years : Io loses about a ton (1000 kilograms) of sulfur dioxide per second to Jupiter's magnetosphere.
What company learn from monitor employee email communication : What can a company learn from monitoring employee email communications? Discuss whether or not you think a company has a right to monitor employee email
Number of visible energy-level transitions : Which of the above elements would you conclude has the most complex atomic structure? Give some explanation for your reasoning.
Prepare an analysis showing the total cost saving : Manson Industries incurs unit costs of $7 in making an assembly part for its finished product. Prepare an analysis showing the total cost saving

Reviews

Write a Review

Accounting Basics Questions & Answers

  How much control does fed have over this longer real rate

Hubbard argues that the Fed can control the Fed funds rate, but the interest rate that is important for the economy is a longer-term real rate of interest.   How much control does the Fed have over this longer real rate?

  Coures:- fundamental accounting principles

Coures:- Fundamental Accounting Principles: - Explain the goals and uses of special journals.

  Accounting problems

Accounting problems,  Draw a detailed timeline incorporating the dividends, calculate    the exact Payback Period  b)   the discounted Payback Period. the IRR,  the NPV, the Profitability Index.

  Write a report on internal controls

Write a report on Internal Controls

  Prepare the bank reconciliation for company

Prepare the bank reconciliation for company.

  Cost-benefit analysis

Create a cost-benefit analysis to evaluate the project

  Theory of interest

Theory of Interest: NPV, IRR, Nominal and Real, Amortization, Sinking Fund, TWRR, DWRR

  Liquidity and profitability

Distinguish between liquidity and profitability.

  What is the expected risk premium on the portfolio

Your Corp, Inc. has a corporate tax rate of 35%. Please calculate their after tax cost of debt expressed as a percentage. Your Corp, Inc. has several outstanding bond issues all of which require semiannual interest payments.

  Simple interest and compound interest

Simple Interest, Compound interest, discount rate, force of interest, AV, PV

  Capm and venture capital

CAPM and Venture Capital

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd