There are five types of fraud schemes in systems development cycles (refer to Figure 12.6)? Identify an
Question:
FIGURE 12.6:
Transcribed Image Text:
Phase Scenario Oversights Requirements Definition Phase 195 illegitimate drivers' licenses are created and sold by a police communications officer who accidentally discovers she can create them. Lack of authentication and role-based access control requirements Lack of segregation of duties System Design A special function to expedite handling of cases allows two caseworkers to pocket $32,000 in kickbacks. Insufficient attention to security details in automated workflow processes Phase An employee realizes there is no computerized control in his firm's system, so he entered and profited from $20 million in Lack of consideration for security vulnerabilities posed by authorized system access fake health insurance claims. An 18-year-old former web developer System Implementation Lack of code reviews uses backdoors he inserted into his code to access his former firm's network, spam its customers, alter its applications, and ultimately put the firm out of business. Phase System Deployment A computer technician uses his unrestricted access to customers' systems to plant a virus on their networks that brings the customers' systems to a halt. Lack of enforcement of Phase documentation practices and backup procedures A software engineer did not document or back up his source code intentionally and then deleted the only copy of the source code once the system was in production. Unrestricted access to all customers' systems System Maintenance Phase A foreign currency trader covers up losses of $691 million over a 5-year period by making Lack of code reviews End-user access to source unauthorized changes to the source code. code A logic bomb sits undetected for 6 months before finally performing a mass deletion of Ineffective backup processes data of a telecommunications firm.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 53% (13 reviews)
a Lack of authentication andor role based acc...View the full answer
Answered By
Aun Ali
I am an Associate Member of Cost and Management Accountants of Pakistan with vast experience in the field of accounting and finance, including more than 17 years of teaching experience at university level. I have been teaching at both undergraduate and post graduate levels. My area of specialization is cost and management accounting but I have taught various subjects related to accounting and finance.
5.00+
13+ Reviews
32+ Question Solved
Related Book For
Accounting Information Systems
ISBN: 978-1260153156
2nd edition
Authors: Vernon Richardson, Chengyee Chang, Rod Smith
Question Posted:
Students also viewed these Business questions
-
There are five types of management earnings techniques presented in this chapter. Provide two or three specific examples of how corporate leaders could pull off these types of fraud, as well as the...
-
There are five types of boxes whose sizes and demands are given in the table below. The unit cost of a box is equal to its size, and there is an initial cost of $100 to produce each type of box....
-
What are the five types of analytical procedures? Briefly discuss each. There are five types of analytical procedures: (1) Those ratios that compare client and industry data; (2) Ratios that compare...
-
Data visualization can help Broadway theatre analysts to understand ticket pricesExample: Recall the Service Company Insight box How Much Did You Pay for That Seat? presented in the chapter. As...
-
Find g'(x) if g(x) = 1/ x3 - 4x.
-
A A A B B B B B A A A A A A A Use the given sequence to determine the values of n1 n2, the number of runs G, and the 5% cutoff values from Table A-10.
-
Event A: Randomly select a female badminton player. Event B: Randomly select a badminton player who is 25 years old. Determine whether the events are mutually exclusive. Explain your reasoning.
-
Ethical Issue: Discuss the ethics of the indirect pattern of organization. Is it manipulative to delay the presentation of the main idea in a message?
-
Amounts are in thousands of dollars ( except number of shares and price per share ) : Kiwi Fruit Company Balance Sheet Cash and equivalents $ 3 7 0 Operating assets 7 8 0 Property, plant, and...
-
Textflix is a new idea to help reduce college student cost of textbooks. Textflix is a new project to be undertaken by the Netflix Corporation. Textflix will charge $20 per month to have access to a...
-
Internal auditors are often tasked with testing vulnerabilities. How would you suggest testing for system intrusion, logical access control, natural disasters, and intentional destruction of...
-
Identify the main components of vulnerability management and assessment? Component a. Prioritize vulnerabilities b. Design a risk response plan c. Monitor vulnerabilities d. Establish policy and...
-
A person rolls a die, tosses a coin, and draws a card from an ordinary deck. He receives $3 for each point up on the die, $10 for a head and $0 for a tail, and $1 for each spot on the card (jack =...
-
Stackhouse Inc. recently made a loan payment, when the company records the transaction in a tabular analysis, it would include a [ Select ] in the [ Select ] account (i.e. column) and a [ Select ] in...
-
Identify the statement that describes the new "social contract" in the 1950s. Click or tap a choice to answer the question. Unions gained control over capital investments and plant locations, while...
-
To assist in the timely submission of claims, the HIM department has the following focus with the exception of: Obtain control of the chart Code the chart as quickly as possible Allow providers to...
-
The monthly high and low levels of direct labor hours and total manufacturing overhead costs for Onyx Company are as shown: Level Direct Labor Hours Manufacturing Overhead Costs Highest observed...
-
6) Draw a timing diagram for x1, x2, x3, and f, for the circuit shown in the figure. x2 x3 x D D f
-
Indicate if you believe that a correlation exists between the quantities on the horizontal and vertical axes. If so, indicate if you believe that the correlation is a strong positive correlation, a...
-
Consider the following cash flows in Table P5.5. (a) Calculate the payback period for each project. (b) Determine whether it is meaningful to calculate a payback period for project D. (c) Assuming...
-
Why are program change procedures important to auditors?
-
What is the importance of the SPL?
-
What functions does the SPLMS control?
-
What strategies can organizations employ to proactively identify and mitigate budgetary risks, such as cost overruns, revenue shortfalls, and unforeseen contingencies, in order to safeguard financial...
-
Determine if the following piecewise defined function is differentiable at x=0. f(x)= 3x-5, X0 x + 5X-5, X <0 What is the right-hand derivative of the given function? f(0+h)-f(0) lim h h0+ (Type an...
-
Consider the first order differential equation with initial condition t'+3t2y=2t, y(1)=16 where is a function of time t. 1 a. Show that y= + C +3 where C is an arbitrary constant, is the general...
Study smarter with the SolutionInn App