The following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring.
-
Criminals posing as small business owners obtained names, addresses, and social security numbers from an organization whose business is providing such information only to legitimate customers who have a right to the data.
-
An executive of a financial services firm implements a wireless network so that she can work at home from anywhere in her house. After setting up the network, she logs on using the default password.
-
An organization’s top salesman uses a consumer-grade instant messaging (IM) client (e.g., AOL Instant Messaging). Such clients bypass antivirus and spam software, don’t have auditing and logging capabilities, and allow users to choose their IM names.
-
A financial analyst’s laptop was stolen from his car. The laptop contained the names and social security numbers of 27,500 current and former employees.
-
To keep track of the passwords used to access various computer systems, employees create Word documents listing their passwords and store the document with the name “passwords.doc.”
-
Backup disks that included information on 3.9 million credit card customers were lost in transit to a credit bureau. Data included names, social security numbers, account numbers, and payment histories.
-
Private and sensitive information is sent to multiple persons via e-mail. The e-mails include all addressee names within the e-mail address list.
-
An individual made millions by purchasing bank account information from eight employees of various banks. He had approximately 540,000 accounts in his database. Some bank employees were accessing up to 300 customer accounts each week to obtain the account information that they were selling.
-
A third-party processor of credit card transactions allowed an unauthorized individual to infiltrate its network and access cardholder data.
-
An individual sold his cell phone on eBay. The cell phone contained hundreds of confidential business-related e-mails.
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps with 3 images
- Provide an example of each of the following; Conspicuous consumption Information you will need to fill out an application to rent an apartment A government agency you can contact to file a fraud complaint A way to prevent fraud on your credit card A way to protect yourself from identity theftarrow_forward1. How do you understand Fraud in your own words? Please provide explanation. 2. How do you understand the Fraud Triangle? Please provide explanation. 3. Favorite topic in Forensic Accounting? 4. What recommendations will you give to prevent fraud? 5. Will you consider becoming a Fraud investigator in the Future? Why or why not.arrow_forwardThe best way to enact a broad fraud prevention program is toa. Install airtight control systems of checks and supervision.b. Name an ethics officer who is responsible for receiving and acting upon fraud tips.c. Place dedicated hotline telephones on walls around the workplace with direct communication to the company ethics officer.d. Establish a corporate culture conducive to ethical behavior in the workplacearrow_forward
- Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. The number of incidents and the total dollar losses from computer fraud are increasing rapidly for several reasons: a. Many instances of computer fraud go undetected and many frauds are not reported. b. Many companies are moving to cloud services where there are few data security controls. c. Internet sites offer step-by-step instructions on how to perpetrate computer fraud and abuse. d. Law enforcement is not interested in preventing or prosecuting computer fraud. e. There are no laws against computer fraud so prosecution is difficultarrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Cyber sleuths need the following skills: a. Ability to do complex programming so they can develop their own software to examine corporate data and records. b. Ability to follow a trail, think analytically, and be thorough. c. Ability to use their computer engineering experience to evaluate the hardware used by the company d. Ability to think like a fraud perpetrator and use hacking tools and techniques. e. Ability to use their legal training to properly prepare the evidence needed to prosecute perpetratorsarrow_forwardIs the following a potential control weakness? A computer network and personal computers support Marco accounting and inventory management systems. Personal computers are located in the offices and warehouse and a central server handles all accounting and inventory files. Printers are located in areas where employees need printed documents and other records routinely. The computer is used to control and process most transactions, to print documents, prepare accounting records, and prepare periodic financial statements. Marco uses commercial software recommended by their auditor. To date, they have had only the usual startup problems. They have used it for two years and have upgraded it once. Briefly explain the potential mistatement and recommended correction.arrow_forward
- 3. Which of the following is not a computer facility control? (a) Place the data processing center where unauthorized individuals cannot gain entry to the facility. (b) Limit access to the data processing center all employees of the company. (c) Buy insurance to protect against loss of equipment in the computer facility. (d) Use advanced technology to identify individuals who are authorized access to the data processing center. 4.For internal control over computer program changes, a policy should be established requiring that: (a) All proposed changes be approved by a responsible individual and logged. (b) The programmer designing the change should be responsible for ensuring that the revised program is adequately tested. (c) All program changes be supervised by the information system control group. (d) To facilitate operational performance, superseded portions of programs should not be deleted from the program run manual. 5. Auditing "around the computer": (a) Assumes that accurate…arrow_forwardAn accounting manager, who has full access to a Company’s accounting system also has access to the bank account and is able to send cash payments without supervision. What is an internal control that should be implemented to reduce the risk of theft or fraud in this company?arrow_forwardWhat are the three different types of Check Fraud.What steps could you take to protect your customer and the bank from check fraud?arrow_forward
- Whistle-blowers have played a key role in fraud detection. There are several types of whistle-blowers and safeguards for each type. Analyze the adversities that whistle-blowers face, including the safeguards intended to protect them. Compare the different types of whistle-blowers. What is the importance of each type?arrow_forward“Identity theft is often applied to a wide range of crimes, including checking account fraud, counterfeiting, forgery, auto theft using false documentation, trafficking in human beings, and terrorism, most policymakers, and researchers agree that identity theft includes the misuse of another individual’s personal information to commit fraud”. Required: Where does identity theft fraud happen often? Explain any five steps that victims should need to take once identity theft occurs.arrow_forwardLamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will customer orders be received via the Internet? Are all collections from customers received in the form of checks? Are product quantities monitored regularly?arrow_forward
- AccountingAccountingISBN:9781337272094Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.Publisher:Cengage Learning,Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Horngren's Cost Accounting: A Managerial Emphasis...AccountingISBN:9780134475585Author:Srikant M. Datar, Madhav V. RajanPublisher:PEARSONIntermediate AccountingAccountingISBN:9781259722660Author:J. David Spiceland, Mark W. Nelson, Wayne M ThomasPublisher:McGraw-Hill EducationFinancial and Managerial AccountingAccountingISBN:9781259726705Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting PrinciplesPublisher:McGraw-Hill Education