1.
A company hires an audit program design firm to create a continuous auditing program for their company. After six months the project is behind schedule and is costing more than expected. This is an example of:
(b) Development/acquisition and deployment risk.
2.
A manager of an investment fund reports annual fund performance as higher than actual returns so that he can obtain new investors. This action would be classified as a:
(c) fraud
3.
This logs and monitors who is on or trying to access an organization’s network is:
(c) Intrusion detection systems (IDS)
4.
A hurricane destroys a building containing backup computer systems. This is an example of:
(d) Hardware/software risk
5.
A manager in the sales department of a company buys software to handle job costing, but the program cannot handle some of the custom order features of the products they sell. This is an example of:
(a) Selection risk
A company hires an audit program design firm to create a continuous auditing program for their...
The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...
A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...
Case 2: Going to The X-Stream Gil Reihana is the chief executive officer of X-Stream, an Auckland-based company that assembles personal computers for the New Zealand and Australian markets, and sells them through a number of chain stores and independent retailers. He started the company six years ago, at the age of 25, after graduating from university with a Bachelor’s degree in Information Technology and Management. To establish the company, Reihana invested $300 000 he had inherited and persuaded various...
The administration of President Barack Obama has made Patient Protection and Affordable Care Act, often called “Obamacare”, its chief domestic accomplishment and the centerpiece of Obama’s legacy. Essential to Obama’s health care reform plan is Healthcare.gov, a health insurance exchange Web site that facilitates the sale of private health insurance plans to U.S. residents, assists people eligible to sign up for Medicaid, and has a separate marketplace for small businesses. The site allows users to compare prices on health insurance...
How can we assess whether a project is a success or a
failure?
This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...