Listed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique. a) A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. b) Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. c) Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at home, which he also used at his office when connecting to the company’s network. The program contained a virus that spread to the company’s mainframe. d) Harry, a trusted employee and a system engineer, had access to both the network access control list and user passwords. The firm’s competitor recently hired him for a large increase in salary. After leaving, Harry continued to browse through his old employer’s data, such as price lists, customer lists, bids on jobs, and so on. He passed this information on to his new employer.
Listed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique.
a) A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks.
b) Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s
c) Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at home, which he also used at his office when connecting to the company’s network. The program contained a virus that spread to the company’s mainframe.
d) Harry, a trusted employee and a system engineer, had access to both the network access control list and user passwords. The firm’s competitor recently hired him for a large increase in salary. After leaving, Harry continued to browse through his old employer’s data, such as price lists, customer lists, bids on jobs, and so on. He passed this information on to his new employer.
Question 4
The internal auditors of Tantacle Electrical Company report to the controller. Because of changes made in the past year to several of the transaction processing programs, the internal auditors created a new test data set. The external auditors requested that the old date set also be run. The internal auditors, embarrassed, explained that they overwrote the original test data set.
Required:
Outline any potential risks and determine the courses of action the external auditor should take.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 3 images