The chapter mentioned three potential internal controls for an e-business environment: encryption, segregation of duties, and access restrictions. Consider your study of internal controls throughout this text; suggest five additional internal controls for e-business environments. Explain specifically how you would apply them.
Answer to relevant QuestionsAs you read in the chapter, the presence of a computer network is the defining characteristic of e-business. Research the topic and define each of the following terms related to networks and networking. a. Local area ...Create a free account that will give you access to the CoBIT documents; then, work with a group of students to address one or more of the following questions: a. What are the five IT Governance Focus Areas identified in the ...Which type(s) of business risks/threats described in the chapter best applies to each situation below? If more than one applies, explain why. a. Blackmail based on stolen information. b. Concurrent attacks against a ...Multiple choice. Please refer to the case in Problem 12 as you respond to these questions. 1. In a systems flowchart, which of the following is most likely to be depicted with a predefined process symbol? a. Browse ...LCK Corporation manufactures small tools such as hammers and screwdrivers. Many of LCK’s employees pocket some of the firm’s manufactured tools for their personal use. Since the quantities taken by any one employee were ...
Post your question