Question: Amos Technology Sdn Bhd is a medium-sized retail operation with an IT staff of 10 employees. The IT staff effectively maintains all accounting functions as
Amos Technology Sdn Bhd is a medium-sized retail operation with an IT staff of 10 employees. The IT staff effectively maintains all accounting functions as well as computer operations. The overall internal control and security system is quite good. However, there are a number of problems. First, all the IT employees know the passwords to each other's accounts. Although this is a breach of security system, most employees feel that the other employees are lax about the document distribution procedures. Almost anybody can come into the server and pick up a printout without an entry being logged into the records. Security has repeatedly complained to these employees about the problem but no avail. Required: a) Explain the any SIX (6) different methods that an individual might use to perpetrate a computer fraud in above situation. (12 marks) b) Explain the TWO (2) types of threats that affect information systems. (8 marks) c) Explain the different between the qualitative and quantitative approaches to analyse system vulnerabilities and threats
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
