1. Imagine that you are designing a smishing scam that involves sending texts to people to entice...
Question:
1. Imagine that you are designing a smishing scam that involves sending texts to people to entice them to go to a website and provide personal information that you can use to access their checking account. Craft a text message that would be difficult for people to ignore. Design a simple web page that would look legitimate to people who bank at your bank and that would capture their checking account number and PIN.
2. Briefly describe the difference between reasonable assurance and risk assessment?
3. Go to the website of one of the three primary consumer credit reporting companies (Equifax, Experian, or TransUnion). Find the instructions to request a free credit report, and do so. How long did it take to receive your free credit report? Is there information on the report you believe to be in error? Check the website and credit report to find out how can you dispute any information which you believe is in error.
4. Should some sort of congressional approval or review process be established for executive orders? Why or why not?
5. What is the difference between a pen register and a trap and trace? What is required in order for a law enforcement agency to gain approval for use of one of these measures?
6. What are the main reasons employers monitor workers? Provide examples of three types of employee monitoring that you feel are justified. Provide three examples of three types of employee monitoring you feel are not justified
Accounting Information Systems
ISBN: 978-0133428537
13th edition
Authors: Marshall B. Romney, Paul J. Steinbart