Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 6, Problem 6.19CS6
Explanation of Solution
FinQloud system:
FinQloud is established as a cloud storage system, developed to meet the terms and regulations of the SEC’s rulings.
- When data is stored in FinQloud system, then FinQloud process the data by which it cannot be altered or encrypted again. Because data is indexed in Simple Storage Service (S3) devices.
- Hence the data can be read only by an authorized user.
The SEC rules and its 2003 interpretation:
The Securities and Exchange Commission (SEC) had taken the rule to enable a storage
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
1. The estimates of losses annually due to computer fraud vary widely. Why do you think obtaining a good estimate of this figure is difficult?
2. Explain at least three forms of computer fraud.
Provide some scenarios in which a company may use IT to conceal financial wrongdoing from an auditing firm, and some ways in which that firm can mitigate those risks.
When does the responsibility for protecting a company's data begin and end? When do security policies and procedures begin to have an effect in a given company, and when do they end? Is it possible, in your opinion, to increase these bounds?
Chapter 6 Solutions
Using MIS (10th Edition)
Ch. 6.3 - Prob. 1EGDQCh. 6.3 - Prob. 2EGDQCh. 6.3 - Prob. 3EGDQCh. 6.3 - Prob. 4EGDQCh. 6.3 - Prob. 5EGDQCh. 6.3 - Prob. 6EGDQCh. 6.3 - Prob. 7EGDQCh. 6.3 - Prob. 8EGDQCh. 6.3 - Prob. 9EGDQCh. 6.7 - Prob. 1QLQ
Ch. 6.7 - Prob. 2QLQCh. 6.7 - Prob. 3QLQCh. 6.7 - The article mentions that quantum computers will...Ch. 6.8 - Prob. 1SGDQCh. 6.8 - Prob. 2SGDQCh. 6.8 - Prob. 3SGDQCh. 6.8 - Prob. 4SGDQCh. 6.8 - Prob. 5SGDQCh. 6.8 - Prob. 6.1ARQCh. 6.8 - Prob. 6.2ARQCh. 6.8 - Prob. 6.3ARQCh. 6.8 - Prob. 6.4ARQCh. 6.8 - Prob. 6.5ARQCh. 6.8 - Prob. 6.6ARQCh. 6.8 - Prob. 6.7ARQCh. 6.8 - Prob. 6.8ARQCh. 6 - Prob. 6.1UYKCh. 6 - Prob. 6.2UYKCh. 6 - Prob. 6.3UYKCh. 6 - Prob. 6.4UYKCh. 6 - Prob. 6.5UYKCh. 6 - Prob. 6.6UYKCh. 6 - Prob. 6.7CE6Ch. 6 - Prob. 6.8CE6Ch. 6 - Prob. 6.9CE6Ch. 6 - Prob. 6.1CE6Ch. 6 - Prob. 6.11CE6Ch. 6 - Prob. 6.12CE6Ch. 6 - Prob. 6.14CS6Ch. 6 - Prob. 6.15CS6Ch. 6 - Prob. 6.16CS6Ch. 6 - Prob. 6.17CS6Ch. 6 - Prob. 6.18CS6Ch. 6 - Prob. 6.19CS6Ch. 6 - Prob. 6.2CS6Ch. 6 - Prob. 6.21MMLCh. 6 - Prob. 6.22MML
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- In order to answer this question, what is the goal of doing an audit?arrow_forwardWhy is company information confidentially important? What types of mistreatment come to mind in the absence of confidentiality controls? What illicit acts may be curtailed or stopped if confidentiality rules were properly put into place?arrow_forwardWhat was novel in the way Deutsche Bank controls its identities?arrow_forward
- Damon Davis was putting the finishing touches on the paperwork for Drano Plumbing. He estimated that the net profit would be $50,000. When he tallied the columns on the Balance Sheet, he saw that the debit column equaled $400,000 and the credit column totaled $300,000. What was the most likely reason for the discrepancy in results? If this was not the root of the problem, what should he do to identify the source of the problem?arrow_forwardQuestion 14 papa.What is the difference between failing an audit from a Governmental agency such as an FFIEC Audit and failing an audit from Industry Regulatory Body like the PCI Audit? Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this linearrow_forwardProvide some specific instances of how a corporation may utilize IT to hide financial fraud from an auditing firm, and how the auditing firm might lessen its vulnerability to such fraud.arrow_forward
- Sarbanes-Oxley audit: What are the two main types of security policies and procedures that were put in place?arrow_forwardExist any concerns regarding the company's security?arrow_forwardSelect all type of employees that can cause a data breach as mentioned on the topic discussion (Select 3 answers only) * Supervisor Malicious Employee Innocent Actions Employees Regular Employee Ranking File Employee Careless or Negligent Employeearrow_forward
- What's the Single Audit Act's procedure?What impact has this law had on the auditing of governmental organizations?What forms do reports and views from auditors take?arrow_forwardFollowing a tendering process your firm has recently been appointed external auditor of Dazzle Ltd (Dazzle) for the year ending 31 July 20X1. The audit engagement letter is still to be signed. The previous auditor did not seek reappointment. Your firm has also been invited to provide tax planning and compliance work for the company. All of the shares of Dazzle are owned by two sisters: Ruby and Amber Dazzle. They are the only directors and spend on average three days a week managing Dazzle as they have other business interests. The company employs a full-time qualified accountant but does not have a Finance Director. Dazzle manufactures and sells high quality mirrors and light fittings, which are produced in the company’s workshop, in the North East of England. At peak times the company uses subcontractors to help with the manufacture of light fittings as they lack sufficient staff in this area. Due to changes in working practices as a result of covid-19 fewer people are permitted in…arrow_forwardWhat is the Single Audit Act's purpose?How has this legislation influenced the auditing of government agencies?What kind of reports and opinions do auditors provide?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education