Question

Name Wannarat Natilerdsak Student ID6101139 IAC 326 Accounting Information System Homework Chapter 4 Relational Databases Explain...

Name Wannarat Natilerdsak Student ID6101139
IAC 326 Accounting Information System
Homework



Chapter 4 Relational Databases
Explain the importance and advantages of databases.

Essay Questions
1). Explain the importance and advantages of databases?

Answer:

Chapter 5: Computer Fraud
Explain the threats faced by modern information systems.
Explain the fraud triangle.
Define computer fraud and discuss the different computer fraud classifications.
Essay Questions
2). What are the common threats to a computerized accounting system and explain examples?

Answer:

3). What are components of the fraud triangle behind a worker’s decision to commit workplace fraud with explain meaning?

Answer:

4). What are the Computer fraud classification using the data processing model?

Answer:









Chapter 6: Computer Fraud and Abuse Techniques

Compare and contrast computer attack and abuse tactics.
Explain how social engineering techniques are used to gain physical or logical access to computer resources.
Describe the different types of malware used to harm computers.

Essay Questions
5). Explain the three common computer fraud and abuse techniques?

Answer:

6). What the examples for defending against social engineering?

Answer:

7). What is the meaning of Malware as your understanding? How does Malware work?

Answer:

Chapter 7: Control and Accounting Information Systems

Essay Questions
8). What are the important functions of Internal Controls with explanation?

Answer:

9). What are the two basic categories of controls over information systems and meaning?

Answer:

10). What are primary objective of an Accounting Information Systems?

Answer:

0 0
Add a comment Improve this question Transcribed image text
Answer #1
  1. Explain the importance and advantages of databases

Answer – Database management system manage complete flow data process in a systematic way . This Database system help to reduce database errors and improve in consistency . Proper data base system help to improve data security . This system introduced cost benefit system .Most important factor is to maintain proper data integrity . This system represents quick access of data faster way as well as accurate way . This will definitely improve complete financial , operational cycle of any Organization

2) What are the common threats to a computerized accounting system and explain examples?

Normally there are several types of computer threat which all disturb computer security system, access by Unethical person, Few types of computer fraud includes Trojan, Virus, Malware , hackers etc. Common threats which negatively affect confidentiality, integrity and availability of data, this would be mis configured software and unpatched Operating System

3) What are components of the fraud triangle behind a worker’s decision to commit workplace fraud with explain meaning?

What is Fraud Triangle – Fraud Triangle is a Design framework . This design framework help us to identify the reason behind a workers / Employees decide to commit fraud at Workplace , It help us to identify motive , reason that someone in committing fraud .Definitely with help of this triangle , We can identify fraud, detect fraud

Major three reason behind this Fraud Triangle –

  1. Motive – Understand individual motive ( rather fraudster motive to do fraud . One of the major factor will be Economic pressure , meeting Liability , debt , Life style manage etc.
  2. Opportunity - Opportunity normally pop up when Internal Control is weak . Fraudster are well confident that nothing will come in to picture because Internal control system is weak.

Self Justification

  1. What are the Computer fraud classification using the data processing model

Computer fraud classified as – Input fraud, Process fraud, Output fraud , Storage data fraud , Data Fraud , Email threats, Denial Service attack, Computer instruction fraud – basically tampering with software data , develop software program to carry out Unauthorized access.

Input fraud also invite Inventory , payroll, cash related fraud.

5) Explain the three common computer fraud and abuse techniques?

Major Three common Computer fraud and abuse Techniques

Hacked – Hacked into the system and trap system processing ,

Malware – includes Trojan horse, Logic bomb

Superzap – Unauthorised use of Superzap , a software utility that bypass regular system controls

Virus – infected into the system

6) What the examples for defending against social engineering?

Couple of main defending factor against Social Engineering :

Education – Awareness education to Employee . As security professional , find a way to make employee about Security.

Any Organization , need to convince management to increase more budget on Security matter

Awareness – Most important factor is to understand Companies present on Online Portal. We need to be awre about any sensitive and dangerous information which create impact on security

Acceptable Use Policies- Company needs to implement proper acceptable user policy in the Organization. Management will not allow to downloading any unapproved program

Constant Update – Windows update

Verifying Identity

7)What is the meaning of Malware as your understanding? How does Malware work\

Malware is really dangerous treats . This one easily damage services , stealing data, mess viruses, ransom ware

Malware normally creates by Hackers . Malware is a combination of Malicious + Software

Virus – They can spread without control and clean up all files and badly affected other file also

Spyware – Managed to Spy on Individual . Spy on password , credit card number etc,

Worms – Effect and destroy entire network either local or across Internet ,

8)What are the important functions of Internal Controls with explanation

Most important function of Internal Control would be :

  1. Established proper Risk Management system and review the same
  2. Effectiveness and efficiency of operation improvement
  3. Established Policies and procedures , Business continuity plan ,
  4. Quality of Information , Effective communication
  5. Separate Evaluation , Ongoing monitoring ,
  6. Integrity , Organizational Structure
  7. Board of Director and Audit committee
  8. Assignment of Authority and responsibility

9)What are the two basic categories of controls over information systems and meaning?

Most important basic categories of Control would be detective , preventive and Corrective action . Also certain important features are segregation of duties , access control , Audit , document standardization , Periodic reconciliation

10)What are primary objective of an Accounting Information Systems?

Primary objective of Accounting Information System ( AIS) – Collect , Store and process the data of Accounting and financial and provide the same to Users .

Following factors are included in AIS:

People , process , Information technology ( mainly hardware ) , data, Software and Internal control system

AIS system always ensure that Internal Control system should be in place to ensure accuracy of data .

AIS system always focus to provide useful data / information to users for perfect decision making

Add a comment
Know the answer?
Add Answer to:
Name Wannarat Natilerdsak Student ID6101139 IAC 326 Accounting Information System Homework Chapter 4 Relational Databases Explain...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • CHAPTER 13 / Developing and implementing Effective Accounting Information Systems 431 14 FIGURE 13-11 PERT network...

    CHAPTER 13 / Developing and implementing Effective Accounting Information Systems 431 14 FIGURE 13-11 PERT network diagram for a systems implementation project. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 Activity Prepare the Physical site 3958 Determine functional changes Select and assign personnel Train personnel Acquire and install computer equipment Establish...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Case Study, Chapter 64, Introduction to the Integumentary System Alice Bixby, an 83-year-old female client js...

    Case Study, Chapter 64, Introduction to the Integumentary System Alice Bixby, an 83-year-old female client js admifted with a cerebral vascular accident with the aphasia and hemiparesis (paralysis of the right side of the body). The client has global a has difficulty speaking or understanding what is said. The client is incontinent of urine and stool and wears adult incontinent briefs. The client has a thickened diet to nectar consistency because of dysphagia (difficulty swallowing). The client has been turned...

  • Case: Enron: Questionable Accounting Leads to CollapseIntroductionOnce upon a time, there was a gleaming...

    Case: Enron: Questionable Accounting Leads to CollapseIntroductionOnce upon a time, there was a gleaming office tower in Houston, Texas. In front of that gleaming tower was a giant “E,” slowly revolving, flashing in the hot Texas sun. But in 2001, the Enron Corporation, which once ranked among the top Fortune 500 companies, would collapse under a mountain of debt that had been concealed through a complex scheme of off-balance-sheet partnerships. Forced to declare bankruptcy, the energy firm laid off 4,000...

  • CASE 20 Enron: Not Accounting for the Future* INTRODUCTION Once upon a time, there was a...

    CASE 20 Enron: Not Accounting for the Future* INTRODUCTION Once upon a time, there was a gleaming office tower in Houston, Texas. In front of that gleaming tower was a giant "E" slowly revolving, flashing in the hot Texas sun. But in 2001, the Enron Corporation, which once ranked among the top Fortune 500 companies, would collapse under a mountain of debt that had been concealed through a complex scheme of off-balance-sheet partnerships. Forced to declare bankruptcy, the energy firm...

  • Discussion questions 1. What is the link between internal marketing and service quality in the ai...

    Discussion questions 1. What is the link between internal marketing and service quality in the airline industry? 2. What internal marketing programmes could British Airways put into place to avoid further internal unrest? What potential is there to extend auch programmes to external partners? 3. What challenges may BA face in implementing an internal marketing programme to deliver value to its customers? (1981)ǐn the context ofbank marketing ths theme has bon pururd by other, nashri oriented towards the identification of...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT