Accounting Information Systems
10th Edition
ISBN: 9781337619202
Author: Hall, James A.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 14, Problem 10DQ
To determine
Identify the system which is more vulnerable to unauthorized access and excessive losses from disaster in the given scenario. Scenario, “A bank in State C has 13 branches spread throughout northern region, each with its own minicomputer where its data are stored. Another bank has 10 branches spread throughout State C, with the data being stored on a mainframe in State SF.”
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
ABC bank has 13 branches spread throught the country, each with its own minicomputer where its data are stored. Another bank, XYZ Bank, has 10 branches spread throughout the country, with data being stored on a mainframe in Makati. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster?
What is a good response to?
Small businesses are increasingly vulnerable to cyber-attacks, which can cause serious disruptions to daily routines and significant financial losses (Sutch, 2023). One of the most damaging types of attack is a denial-of-service attack, also known as a DoS attack. This type of attack is launched against a network or website in an attempt to overwhelm it with traffic, which can cause it to become unavailable for legitimate users. This can have a crippling effect on small businesses, as they often lack the resources to be able to prevent or mitigate such incidents effectively (Sutch, 2023).
If a website or online service is unavailable due to a denial-of-service attack, customers may be unable to purchase products or services, resulting in lost revenue for the business (Sutch, 2023). For small businesses, this type of attack can cost them over $120,000. For enterprise corporations, DoS attacks have risen to over $2 million in costs. Not only do…
Listed here are two scenarios. For each scenario, discuss the possible damages that can occur.Suggest a preventive control.A. An intruder taps into a telecommunications device and retrieves the identifying codes andpersonal identification numbers for ATM cardholders. (The user subsequently codes thisinformation onto a magnetic coding device and places this strip on a blank bank card.)B. Because of occasional noise on a transmission line, electronic messages received are extremelygarbled.Problem # 4 (30
Chapter 14 Solutions
Accounting Information Systems
Ch. 14 - Prob. 1RQCh. 14 - Prob. 2RQCh. 14 - Prob. 3RQCh. 14 - Prob. 4RQCh. 14 - Prob. 5RQCh. 14 - Prob. 6RQCh. 14 - Prob. 7RQCh. 14 - Prob. 8RQCh. 14 - Prob. 9RQCh. 14 - Prob. 10RQ
Ch. 14 - What are the three primary IT functions that must...Ch. 14 - Prob. 12RQCh. 14 - Prob. 13RQCh. 14 - What are the primary reasons for separating...Ch. 14 - Prob. 15RQCh. 14 - Prob. 16RQCh. 14 - Prob. 17RQCh. 14 - Prob. 18RQCh. 14 - Prob. 19RQCh. 14 - Prob. 20RQCh. 14 - Prob. 21RQCh. 14 - Prob. 22RQCh. 14 - Prob. 23RQCh. 14 - Prob. 24RQCh. 14 - Prob. 25RQCh. 14 - Prob. 26RQCh. 14 - Prob. 27RQCh. 14 - Prob. 28RQCh. 14 - Prob. 29RQCh. 14 - Prob. 30RQCh. 14 - Prob. 31RQCh. 14 - Prob. 32RQCh. 14 - Distinguish between errors and irregularities....Ch. 14 - Prob. 34RQCh. 14 - Prob. 35RQCh. 14 - Prob. 36RQCh. 14 - Prob. 37RQCh. 14 - Prob. 38RQCh. 14 - Prob. 39RQCh. 14 - Define commodity IT asset.Ch. 14 - Prob. 41RQCh. 14 - Prob. 42RQCh. 14 - Prob. 1DQCh. 14 - Prob. 2DQCh. 14 - Prob. 3DQCh. 14 - Prob. 4DQCh. 14 - Prob. 5DQCh. 14 - Prob. 6DQCh. 14 - Prob. 7DQCh. 14 - Prob. 8DQCh. 14 - Prob. 9DQCh. 14 - Prob. 10DQCh. 14 - Prob. 11DQCh. 14 - Who should determine and prioritize the critical...Ch. 14 - Prob. 13DQCh. 14 - Define the management assertions of existence or...Ch. 14 - Prob. 15DQCh. 14 - Prob. 16DQCh. 14 - Prob. 17DQCh. 14 - Prob. 18DQCh. 14 - Prob. 19DQCh. 14 - Prob. 20DQCh. 14 - Prob. 21DQCh. 14 - Prob. 22DQCh. 14 - Prob. 23DQCh. 14 - Explain how IT outsourcing can lead to loss of...Ch. 14 - Prob. 25DQCh. 14 - Prob. 26DQCh. 14 - Prob. 27DQCh. 14 - Prob. 1MCQCh. 14 - Prob. 2MCQCh. 14 - Prob. 3MCQCh. 14 - Prob. 4MCQCh. 14 - Prob. 5MCQCh. 14 - Prob. 6MCQCh. 14 - Prob. 7MCQCh. 14 - Prob. 8MCQCh. 14 - Prob. 9MCQCh. 14 - Prob. 10MCQCh. 14 - Prob. 1PCh. 14 - Prob. 2PCh. 14 - Prob. 3PCh. 14 - Prob. 4PCh. 14 - Prob. 5PCh. 14 - Prob. 6PCh. 14 - DISASTER RECOVERY PLAN Hexagon is an online...Ch. 14 - Prob. 8PCh. 14 - Prob. 9PCh. 14 - Prob. 10PCh. 14 - Prob. 11PCh. 14 - Prob. 12PCh. 14 - Prob. 13P
Knowledge Booster
Similar questions
- The following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring. Criminals posing as small business owners obtained names, addresses, and social security numbers from an organization whose business is providing such information only to legitimate customers who have a right to the data. An executive of a financial services firm implements a wireless network so that she can work at home from anywhere in her house. After setting up the network, she logs on using the default password. An organization’s top salesman uses a consumer-grade instant messaging (IM) client (e.g., AOL Instant Messaging). Such clients bypass antivirus and spam software, don’t have auditing and logging capabilities, and allow users to choose their IM names. A financial analyst’s laptop was stolen from his car. The laptop contained the names and social security numbers of…arrow_forwardListed here are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a preventive control.a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. (The user subsequently codes this information ontoa magnetic coding device and places this strip on a piece of cardboard.)b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled.c. Because of occasional noise on a transmission line, data being transferred is lost or garbled.d. An intruder is temporarily delaying important strategic messages over the telecommunications lines.e. An intruder is altering electronic messages before the user receives them.arrow_forwardWhat is a good response to? A DoS attack is when legitimate users cannot access information systems or services because of the actions of a malicious actor who floods the targeted system with excessive traffic, rendering it unresponsive (CISA, 2021). These attacks are a danger to online retailers because they disrupt operations and lead to substantial financial and reputational damage (Crumbley & Fenton, 2021). For high-priority applications, revenue losses can reach upwards of $67,651 per hour during downtime. Employee productivity declines when critical business applications are offline, and remediation efforts incur extra costs, such as overtime pay and external consulting fees. Such disruptions can tarnish brand reputation, driving customers to competitors and causing long-term market share loss. Some attacks come with ransom demands, adding further financial strain (Sansone, 2024).arrow_forward
- The estimates of losses annually resulting from computer fraud vary widely. Why do you think obtaining a good estimate of this figure is difficult?arrow_forwardcould you help me wth those plzarrow_forwardSelect the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. The number of incidents and the total dollar losses from computer fraud are increasing rapidly for several reasons: a. Many instances of computer fraud go undetected and many frauds are not reported. b. Many companies are moving to cloud services where there are few data security controls. c. Internet sites offer step-by-step instructions on how to perpetrate computer fraud and abuse. d. Law enforcement is not interested in preventing or prosecuting computer fraud. e. There are no laws against computer fraud so prosecution is difficultarrow_forward
- C. Online Banking is a product that becomes increasingly important with the increase in online business. Customers via online banking can have an access to their fund without having to go to the bank. In order to avoid the customers' fund from becoming vulnerable to scammers while conducting banking activities online, banking institutions have taken several security measures. REQUIRED: Explain FIVE (5) security measures imposed by banking institutions for allowing an online access to customer fund.arrow_forward“Organizations are encouraged to take every precaution possible to protect their information systems so that potential for fraud and any resulting losses can be significantly minimized.” Required: Critically explain any three motives behind the cheque fraud scheme. What to do if someone has deposited a fake cheque into your bank account?arrow_forwardDo you think that Sony’s response to the attack was appropriate? Why or why not? What might Sony and the U.S. government done differently to discourage future such attacks on other U.S. organizations? Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyberattacks? According to a recent report by Gartner, most business users will have access to some sort of self-service BI tool within the next few years; however, Gartner estimates that less than 10 percent of companies will have sufficient data governance practices in place to prevent data inconsistencies across the organization. Why do you think so many companies continue to invest in new analytics tools without implementing governance programs that ensure data consistency?arrow_forward
- Preventing Cybercrime and Identity Theft Cybercrime and identity theft have become a growing problem in all aspects of society in recent years. Locate an article about cybercrime or identity theft in an organization from one of the types we have discussed in the course (government, not-for-profit organization, healthcare organization, or college or university). Summarize the case of cybercrime or identity theft in your article. What are the risks of these types of crimes to their organization? How can auditing and internal controls help prevent a company from falling prey to cybercrime? Then, review the examples shared by your peers. What strategies related to auditing and internal controls could you suggest for the organizations they shared?arrow_forwardTypes of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations. (a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her…arrow_forwardA multimediacourse graduate used design software to create paychecks that lookedidentical to those of a company in his town.The paychecks were deposited electronically into ofhis friends’ accounts. What type of fraud did hecommit? Select one: a. output fraud. b. input fraud. c. computer instruction fraud. d. processor fraud.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Century 21 Accounting Multicolumn JournalAccountingISBN:9781337679503Author:GilbertsonPublisher:CengagePkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Century 21 Accounting Multicolumn Journal
Accounting
ISBN:9781337679503
Author:Gilbertson
Publisher:Cengage
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L