Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 14, Problem 10DQ
To determine
Identify the system which is more vulnerable to unauthorized access and excessive losses from disaster in the given scenario. Scenario, “A bank in State C has 13 branches spread throughout northern region, each with its own minicomputer where its data are stored. Another bank has 10 branches spread throughout State C, with the data being stored on a mainframe in State SF.”
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
ABC bank has 13 branches spread throught the country, each with its own minicomputer where its data are stored. Another bank, XYZ Bank, has 10 branches spread throughout the country, with data being stored on a mainframe in Makati. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster?
Listed here are two scenarios. For each scenario, discuss the possible damages that can occur.Suggest a preventive control.A. An intruder taps into a telecommunications device and retrieves the identifying codes andpersonal identification numbers for ATM cardholders. (The user subsequently codes thisinformation onto a magnetic coding device and places this strip on a blank bank card.)B. Because of occasional noise on a transmission line, electronic messages received are extremelygarbled.Problem # 4 (30
C.
Online Banking is a product that becomes increasingly important with the increase in
online business. Customers via online banking can have an access to their fund without
having to go to the bank. In order to avoid the customers' fund from becoming
vulnerable to scammers while conducting banking activities online, banking institutions
have taken several security measures.
REQUIRED:
Explain FIVE (5) security measures imposed by banking institutions for allowing an
online access to customer fund.
Chapter 14 Solutions
Accounting Information Systems
Ch. 14 - Prob. 1RQCh. 14 - Prob. 2RQCh. 14 - Prob. 3RQCh. 14 - Prob. 4RQCh. 14 - Prob. 5RQCh. 14 - Prob. 6RQCh. 14 - Prob. 7RQCh. 14 - Prob. 8RQCh. 14 - Prob. 9RQCh. 14 - Prob. 10RQ
Ch. 14 - What are the three primary IT functions that must...Ch. 14 - Prob. 12RQCh. 14 - Prob. 13RQCh. 14 - What are the primary reasons for separating...Ch. 14 - Prob. 15RQCh. 14 - Prob. 16RQCh. 14 - Prob. 17RQCh. 14 - Prob. 18RQCh. 14 - Prob. 19RQCh. 14 - Prob. 20RQCh. 14 - Prob. 21RQCh. 14 - Prob. 22RQCh. 14 - Prob. 23RQCh. 14 - Prob. 24RQCh. 14 - Prob. 25RQCh. 14 - Prob. 26RQCh. 14 - Prob. 27RQCh. 14 - Prob. 28RQCh. 14 - Prob. 29RQCh. 14 - Prob. 30RQCh. 14 - Prob. 31RQCh. 14 - Prob. 32RQCh. 14 - Distinguish between errors and irregularities....Ch. 14 - Prob. 34RQCh. 14 - Prob. 35RQCh. 14 - Prob. 36RQCh. 14 - Prob. 37RQCh. 14 - Prob. 38RQCh. 14 - Prob. 39RQCh. 14 - Define commodity IT asset.Ch. 14 - Prob. 41RQCh. 14 - Prob. 42RQCh. 14 - Prob. 1DQCh. 14 - Prob. 2DQCh. 14 - Prob. 3DQCh. 14 - Prob. 4DQCh. 14 - Prob. 5DQCh. 14 - Prob. 6DQCh. 14 - Prob. 7DQCh. 14 - Prob. 8DQCh. 14 - Prob. 9DQCh. 14 - Prob. 10DQCh. 14 - Prob. 11DQCh. 14 - Who should determine and prioritize the critical...Ch. 14 - Prob. 13DQCh. 14 - Define the management assertions of existence or...Ch. 14 - Prob. 15DQCh. 14 - Prob. 16DQCh. 14 - Prob. 17DQCh. 14 - Prob. 18DQCh. 14 - Prob. 19DQCh. 14 - Prob. 20DQCh. 14 - Prob. 21DQCh. 14 - Prob. 22DQCh. 14 - Prob. 23DQCh. 14 - Explain how IT outsourcing can lead to loss of...Ch. 14 - Prob. 25DQCh. 14 - Prob. 26DQCh. 14 - Prob. 27DQCh. 14 - Prob. 1MCQCh. 14 - Prob. 2MCQCh. 14 - Prob. 3MCQCh. 14 - Prob. 4MCQCh. 14 - Prob. 5MCQCh. 14 - Prob. 6MCQCh. 14 - Prob. 7MCQCh. 14 - Prob. 8MCQCh. 14 - Prob. 9MCQCh. 14 - Prob. 10MCQCh. 14 - Prob. 1PCh. 14 - Prob. 2PCh. 14 - Prob. 3PCh. 14 - Prob. 4PCh. 14 - Prob. 5PCh. 14 - Prob. 6PCh. 14 - DISASTER RECOVERY PLAN Hexagon is an online...Ch. 14 - Prob. 8PCh. 14 - Prob. 9PCh. 14 - Prob. 10PCh. 14 - Prob. 11PCh. 14 - Prob. 12PCh. 14 - Prob. 13P
Knowledge Booster
Similar questions
- “Organizations are encouraged to take every precaution possible to protect their information systems so that potential for fraud and any resulting losses can be significantly minimized.” Required: Critically explain any three motives behind the cheque fraud scheme. What to do if someone has deposited a fake cheque into your bank account?arrow_forwardDo you think that Sony’s response to the attack was appropriate? Why or why not? What might Sony and the U.S. government done differently to discourage future such attacks on other U.S. organizations? Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyberattacks? According to a recent report by Gartner, most business users will have access to some sort of self-service BI tool within the next few years; however, Gartner estimates that less than 10 percent of companies will have sufficient data governance practices in place to prevent data inconsistencies across the organization. Why do you think so many companies continue to invest in new analytics tools without implementing governance programs that ensure data consistency?arrow_forwardTypes of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…arrow_forward
- Select the correct answer(s) for the following multiple choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true about computer fraud perpetrators? a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining stature in the hacking community. b. They do not see themselves as criminals and rarely, if ever, seek to turn their actions into money. c. They write and sell malicious software that infect computers with viruses or can be used to steal money or data that can be sold. d. They are a top FBI priority because they organize fraud schemes targeted at specific individuals and businesses.arrow_forwardMany credit card fraud offenders are now becoming more organized than before, resulting in higher losses from their offenses. Countries such as the USA and the UK have been seen improving their fraud prevention strategies by enhancing coordination in combating fraud. The establishment of the President’s Identity Theft Task Force in the USA and the National Fraud Authority in the UK are evidence of the importance of coordinated efforts in addressing fraud problems. Author’s research suggests that the key areas of resource allocation in credit card fraud prevention within a payment system are: understanding of the real problems, fraud prevention policy, fraud awareness, technology-based protection, identity management and legal deterrence. These areas are mainly supported by four pillars: user, institution, network and government and industry. This is dubbed by the author as the “four pillared-house of payments fraud prevention practice” Referring to the fraud statistics from the…arrow_forwardMany credit card fraud offenders are now becoming more organized than before, resulting in higher losses from their offenses. Countries such as the USA and the UK have been seen improving their fraud prevention strategies by enhancing coordination in combating fraud. The establishment of the President’s Identity Theft Task Force in the USA and the National Fraud Authority in the UK are evidence of the importance of coordinated efforts in addressing fraud problems. Author’s research suggests that the key areas of resource allocation in credit card fraud prevention within a payment system are: understanding of the real problems, fraud prevention policy, fraud awareness, technology-based protection, identity management and legal deterrence. These areas are mainly supported by four pillars: user, institution, network and government and industry. This is dubbed by the author as the “four pillared-house of payments fraud prevention practice” Referring to the fraud statistics from the…arrow_forward
- The COVID-19 pandemic has affected one of your customers, NEST Ltd adversely. Even though the economies are fast recovering, they have contacted your company to request to purchase on credit instead of cash on delivery. Your boss, Alan, the Marketing Manager has instructed you to review their request. He has asked you to review NEST Ltd’s latest set of financial statements. (a)Identify the key financial statements. Explain how the information reported in these statements will help you to decide whether to accede to NEST Ltd’s request.arrow_forwardWhich of the following is not a way to prevent your computer from being attacked by ransomware? A. making sure your antivirus security programs are up to date B. opening all attachments from emails from unknown senders C. using secure (password protected) networks and backing up your files regularly D. not using open Wi-Fi (nonpassword, nonencrypted) in public locationsarrow_forward16) Which of the following is a reason that financial institutions want consumers to use del cards? A) They give the institution a hard "paper trail" for customer transactions. B) For every transaction, the financial institution receives a transaction fee from merchants. C) They reduce the number of teller transactions and check processing costs. D) They allow institutions to replace all their banks with less expensive ATMS. E) They increase the amount of interaction the institution has with its customers.arrow_forward
- Emery Communications Company is considering the production and marketing of a communications system that will increase the efficiency of messaging for small businesses or branch offices of large companies. Each unit hooked into the system is assigned a mailbox number, which can be matched to a telephone extension number, providing access to messages 24 hours a day. Up to 20 units can be hooked into the system, allowing the delivery of the same message to as many as 20 people. Personal codes can be used to make messages confidential. Furthermore, messages can be reviewed, recorded, cancelled, replied to, or deleted all during the same message playback. Indicators wired to the telephone blink whenever new messages are present. To produce this product, a $1.75 million investment in new equipment is required. The equipment will last 10 years but will need major maintenance costing $150,000 at the end of its sixth year. The salvage value of the equipment at the end of 10 years is estimated…arrow_forwardQuestion 8: The accounts of several online customers of a small state bank were hacked and their account information stolen. The bank, because of its proactively contacted all customers after freezing access to the accounts and offered them an alternative hotline to restore secure access to those accounts. Ostanding plans Omanagement by objectives O crisis framework O crisis prevention (1²arrow_forwardYour friend's small business is heavily dependent on information systems and needs to protect them at all costs. What are some of the information security threats and how should these risks be controlled?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,