Study the scenario and complete the question(s) that follow: John owns MXY, a small company that...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Study the scenario and complete the question(s) that follow: John owns MXY, a small company that sells books. John also doubles as the accountant for the business. John is the only one who creates the financial reports at the end of each month. When John is not on the business premises, the Credit Controller is given John's password to log in and carry out some basic functions in the accountant's profile. John had been advised to give the Credit Controller access to some of the functionalities that they are likely to need from the accountant's profile. Unfortunately, John did not have the time to add some of those functionalities to the Credit Controller's profile in the system. Since John travels a lot, he has a book with of passwords that he keeps at home. If John is out of the office and unreachable, the Credit Controller can always call John's house and request the password. At the end of the financial month in August, John realised that some unauthorised payments had been approved from the system on the day that he was in the office. However, he had not authorised those payments. Upon checking further into the system, other transactions that were not sanctioned by him were processed in the months of June and July of the same financial year. Source: Mapaso, N. (2020) Question 6 Advise John on which social engineering techniques could have been used to facilitate the creation of the unauthorised payments from the system by an employee in the Credit Controller's office. (20 Marks) Question 7 Assuming that they had not been in John's office or called John's home, how do you think the unauthorised user had managed to gain access to John's passwords? What are the possible solutions to each of the methods? (20 Marks) Question 8 How can the Systems Administrator setup John's business computer system to have secure passwords if they are running a Windows operating system network? (20 Marks) End of Section B Question 1 Identify and describe two types of malware that can affect your computer. Question 2 Describe in detail why a Systems Administrator has to restrict user privileges on their workstations. (10 Marks) (10 Marks) Question 3 How does a system attacker blindside the user into believing that they are working in the system that they normally use for their day to day transactions? (10 Marks) Question 4 Which methods can an aggrieved company use to make all of your company servers unusable or experience massive delays in processing information? (15 Marks) Question 5 5.1 How do you create security for a computer with Windows 10 to allow the allocated user to go for a tea break without switching off the computer? (7 Marks) End of Section A 5.2 What are the steps that you would follow to allow a new user to have access to the system network? (8 Marks) [Sub Total 15 Marks] Study the scenario and complete the question(s) that follow: John owns MXY, a small company that sells books. John also doubles as the accountant for the business. John is the only one who creates the financial reports at the end of each month. When John is not on the business premises, the Credit Controller is given John's password to log in and carry out some basic functions in the accountant's profile. John had been advised to give the Credit Controller access to some of the functionalities that they are likely to need from the accountant's profile. Unfortunately, John did not have the time to add some of those functionalities to the Credit Controller's profile in the system. Since John travels a lot, he has a book with of passwords that he keeps at home. If John is out of the office and unreachable, the Credit Controller can always call John's house and request the password. At the end of the financial month in August, John realised that some unauthorised payments had been approved from the system on the day that he was in the office. However, he had not authorised those payments. Upon checking further into the system, other transactions that were not sanctioned by him were processed in the months of June and July of the same financial year. Source: Mapaso, N. (2020) Question 6 Advise John on which social engineering techniques could have been used to facilitate the creation of the unauthorised payments from the system by an employee in the Credit Controller's office. (20 Marks) Question 7 Assuming that they had not been in John's office or called John's home, how do you think the unauthorised user had managed to gain access to John's passwords? What are the possible solutions to each of the methods? (20 Marks) Question 8 How can the Systems Administrator setup John's business computer system to have secure passwords if they are running a Windows operating system network? (20 Marks) End of Section B Question 1 Identify and describe two types of malware that can affect your computer. Question 2 Describe in detail why a Systems Administrator has to restrict user privileges on their workstations. (10 Marks) (10 Marks) Question 3 How does a system attacker blindside the user into believing that they are working in the system that they normally use for their day to day transactions? (10 Marks) Question 4 Which methods can an aggrieved company use to make all of your company servers unusable or experience massive delays in processing information? (15 Marks) Question 5 5.1 How do you create security for a computer with Windows 10 to allow the allocated user to go for a tea break without switching off the computer? (7 Marks) End of Section A 5.2 What are the steps that you would follow to allow a new user to have access to the system network? (8 Marks) [Sub Total 15 Marks]
Expert Answer:
Answer rating: 100% (QA)
1 1 Vir uses A virus is a type of malware that can replicate itself and spread to other computers It can attach itself to files or programs and then spread to other computers when those files or progr... View the full answer
Related Book For
Federal Taxation 2016 Comprehensive
ISBN: 9780134104379
29th edition
Authors: Thomas R. Pope, Timothy J. Rupert, Kenneth E. Anderson
Posted Date:
Students also viewed these general management questions
-
John Freeman is investing $8,006 at the end of each year in a fund that earns 6% interest. Click here to view factor tables In how many years will the fund be at $92,000? (Round answer to 0 decimal...
-
John makes deposits of $P at the end of each year for the first n years, $2P at the end of each year for the next n years, and so on, and finally $mP at the end of cach year for the last n years....
-
Given the following cash inflow at the end of each year, what is the future value of this cash flow at 6%, 9%, and 15% interest rates at the end of the seventh year? Year 1 ...... $15,000 Year 2...
-
Mick Stone disposed of the following assets during tax year 2020-21: (1) On 19 May 2020, Mick sold a freehold warehouse for 522,000. This warehouse was purchased on 6 August 2008 for 258,000, and was...
-
A speed control system of an armature-controlled DC motor uses the back emf voltage of the motor as a feedback signal. (a) Draw the block diagram of this system. (b) Calculate the steady-state error...
-
Design two different ladder networks that each output 9 volts and 4 amps when the input is 12 volts and 6 amps.
-
In order to reduce material costs, a composite panel is to be made by placing fibers in the matrix material in an X-pattern of \(\pm \alpha\) as shown in Figure 6.46, instead of randomly distributing...
-
Agler Company specializes in manufacturing motorcycle helmets. The company has enough orders to keep the factory production at 1,000 motorcycle helmets per month. Aglers monthly manufacturing cost...
-
Newtech limited is a new start-up financial technology company based in the East Coast of Scotland. As a start-up, it has 50 full-time employees and has successfully won a number of lucrative...
-
Shake Shack Incorporated, which began as a hot dog stand in 2001, now has more than 200 locations worldwide. The following is adapted from Shake Shack's financial statements for the quarter ended...
-
1 Write down cach hypothesis in the positive accounting theory and explain whether the accounting practices in the company is influenced by the underlying assumptions in the theory?. 2 Do you think...
-
You own a Ceylon Tea bond with a par value of \($1,000\) and an 8-year maturity. It pays a 7 percent annual coupon rate. The bond currently sells for \($1,150\). What is the bonds expected rate of...
-
Siam Cement Group (SCG) bonds have an annual coupon rate of 7 percent and a par value of $1,000 and will mature in 15 years. If you require a return of 8 percent, what price would you be willing to...
-
Fill in the blank with the correct value for @Target that allows the code to compile. A. ElementType.METHOD, ElementType.CONSTRUCTOR B. ElementType.ANNOTATION_TYPE C. ElementType.CONSTRUCTOR,...
-
The market price of an Indochina Airlines bond (\($1,000\) par value) with an 8-year maturity is \($845.\) The bond pays 8 percent interest (4 percent semiannually). What is the bonds expected rate...
-
Pelwatte Sugar Industries has bonds that are selling for $1,432. The coupon interest rate on the bonds is 9.75 percent, and they mature in 23 years. What is the yield to maturity on the bonds? What...
-
Marketing organizations use branding as a means of identifying products and developing an image. Branding strategies involve decisions on the brand name and logo , the package design, and the product...
-
Archangel Corporation prepared the following variance report. Instructions Fill in the appropriate amounts or letters for the question marks in the report. ARCHANGEL CORPORATION Variance...
-
The TUV Partnership is considering two compensation schemes for Tracy, the partner who runs the business on a daily basis. Tracy can be given a $10,000 guaranteed payment, or she can be given a...
-
Refer to the preceding problem. In preceding problem Carls tax liability for last year was $19,000, and his AGI did not exceed $150,000. Carl requests an automatic extension for filing his current...
-
Identify the type of each of the following reorganizations. a. Briggs Corporation was originally incorporated in Georgia but now conducts most of its business in Florida. The firm transfers...
-
On 1 June, Cambria Financial Services Ltd had balances in the Accounts Receivable and Allowance for Doubtful Debts accounts as set out below. Ignore GST. The following transactions occurred during...
-
Northern Communications Specialists Ltd manufactures and sells satellite phones and communication equipment. The company maintains a cash receipts, cash payments, sales, purchases and general journal...
-
All transactions below relate to Alpha Ltds uncollectable accounts for the financial year ended 30 June 2023. Ignore GST The Accounts Receivable account, prior to the transactions listed above, had a...
Study smarter with the SolutionInn App