There are five types of fraud schemes in systems development cycles (refer to Figure 12.6)? Identify an
Question:
FIGURE 12.6:
Transcribed Image Text:
Phase Scenario Oversights Requirements Definition Phase 195 illegitimate drivers' licenses are created and sold by a police communications officer who accidentally discovers she can create them. Lack of authentication and role-based access control requirements Lack of segregation of duties System Design A special function to expedite handling of cases allows two caseworkers to pocket $32,000 in kickbacks. Insufficient attention to security details in automated workflow processes Phase An employee realizes there is no computerized control in his firm's system, so he entered and profited from $20 million in Lack of consideration for security vulnerabilities posed by authorized system access fake health insurance claims. An 18-year-old former web developer System Implementation Lack of code reviews uses backdoors he inserted into his code to access his former firm's network, spam its customers, alter its applications, and ultimately put the firm out of business. Phase System Deployment A computer technician uses his unrestricted access to customers' systems to plant a virus on their networks that brings the customers' systems to a halt. Lack of enforcement of Phase documentation practices and backup procedures A software engineer did not document or back up his source code intentionally and then deleted the only copy of the source code once the system was in production. Unrestricted access to all customers' systems System Maintenance Phase A foreign currency trader covers up losses of $691 million over a 5-year period by making Lack of code reviews End-user access to source unauthorized changes to the source code. code A logic bomb sits undetected for 6 months before finally performing a mass deletion of Ineffective backup processes data of a telecommunications firm.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 50% (12 reviews)
a Lack of authentication andor role based acc...View the full answer
Answered By
Aun Ali
I am an Associate Member of Cost and Management Accountants of Pakistan with vast experience in the field of accounting and finance, including more than 17 years of teaching experience at university level. I have been teaching at both undergraduate and post graduate levels. My area of specialization is cost and management accounting but I have taught various subjects related to accounting and finance.
5.00+
13+ Reviews
32+ Question Solved
Related Book For
Accounting Information Systems
ISBN: 978-1260153156
2nd edition
Authors: Vernon Richardson, Chengyee Chang, Rod Smith
Question Posted:
Students also viewed these Business questions
-
There are five types of management earnings techniques presented in this chapter. Provide two or three specific examples of how corporate leaders could pull off these types of fraud, as well as the...
-
There are five types of boxes whose sizes and demands are given in the table below. The unit cost of a box is equal to its size, and there is an initial cost of $100 to produce each type of box....
-
What are the five types of analytical procedures? Briefly discuss each. There are five types of analytical procedures: (1) Those ratios that compare client and industry data; (2) Ratios that compare...
-
Data visualization can help Broadway theatre analysts to understand ticket pricesExample: Recall the Service Company Insight box How Much Did You Pay for That Seat? presented in the chapter. As...
-
Find g'(x) if g(x) = 1/ x3 - 4x.
-
Sedman, Corp., has projected the following sales for the coming year: Sales in the year following this one are projected to be 15 percent greater in each quarter. a. Calculate payments to suppliers...
-
Air enters the compressor of a simple gas turbine at a pressure of \(1 \mathrm{bar}\) and a temperature of \(25{ }^{\circ} \mathrm{C}\). The compressor has a pressure ratio of 15 , and an isentropic...
-
Accountants try to prepare income statements that are as accurate as possible. A basic requirement in preparing accurate income statements is to record costs and revenues properly. Proper recognition...
-
A For the instant presented, the collar A of the PSSP mechanism is travelling at SA = 100 m/s and is at SA = 0.4 m from 0. The guide for the collar A is the horizontal x-y plane, passing through O,...
-
Larry Power started a new business in the name of Power Electrical on October 1, 2020. During October, a number of activities occurred and the following totals resulted at October 31, 2020 (shown in...
-
Internal auditors are often tasked with testing vulnerabilities. How would you suggest testing for system intrusion, logical access control, natural disasters, and intentional destruction of...
-
Identify the main components of vulnerability management and assessment? Component a. Prioritize vulnerabilities b. Design a risk response plan c. Monitor vulnerabilities d. Establish policy and...
-
Given two prime numbers, p = 37 and q = 23, define the private and public keys by selecting appropriate values of the number e .
-
CONTINUOUS DISCLOSURE OBLIGATIONS Can these detailed results be reported? If yes, then explain how. If no, then explain why not. Refer to the ASX Listing Rules, ASX Scoping Studies guidance, ASX FAQs...
-
Provide the data below Answer the questions. Current Account 1970 1980 1985 1990 2000 2009 Exports of goods and services and income 68,387 344,440 387,612 706,975 1,421,515 2,159,000 receipts Exports...
-
The need for change management in the project management processes. How can the application of change management principles impact the project as a whole?
-
How should the balance of accounts payable be reported in the financial statements?
-
Explain whether you agree with the possible expected challenges in the specialized field of accounting. Why or why not?
-
Find a P T LU factorization of the given matrix A. -1 -1
-
You are planning to purchase your first home five years from today. The required down payment will be $50,000. You currently have $20,000. but you plan to contribute $500 each quarter to a special...
-
Why are program change procedures important to auditors?
-
What is the importance of the SPL?
-
What functions does the SPLMS control?
-
To improve end user experience and reduce core network overhead, the concept of Content Distribution Network (CDN) was proposed. The basic idea is to set up many content buffers that are close to end...
-
What is the main reason to upgrade from a static network to a SDN? What are the risks involved? 2. How SDN technology improves MPLS overlay? Explain.
-
f(x) f(x)=sin(x2)+x-1 f2(x) = x 10-1 f(x) = x52x3 + x - 1 Xu |51% 0 1.2 0.01 0 1.5 0.005 0 1.6 0.002 Develop a Matlab code that implements the bisection method to locate a root of an equation f(x) =...
Study smarter with the SolutionInn App