Question: Authentication and hacking controls at an environmental consulting company. Required: a. From the list of general controls shown in Exhibit 4-5, list each authentication and

Authentication and hacking controls at an environmental consulting company.

Required:
a. From the list of general controls shown in Exhibit 4-5, list each authentication and hacking control that you think the EnviroCons Company should have in place.
b. Explain how each control that you list can prevent IT related risks for EnviroCons.
c. Are there any general controls that you think would not be cost-beneficial?

Step by Step Solution

3.35 Rating (167 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a Any of the Authentication controls could be used including user IDs passwords security tokens or smart cards biometric devices login procedures acce... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

375-B-A-I-S (5253).docx

120 KBs Word File

Students Have Also Explored These Related Accounting Questions!