Question: AUDITING IN A CIS ENVIRONMENT B. Computer Operations and Access to Program & Data Listed below are some scenarios. For each scenario, discuss the potential

AUDITING IN A CIS ENVIRONMENT B. Computer Operations and Access to Program & Data Listed below are some scenarios. For each scenario, discuss the potential consequences and give a prevention technique. Follow this format: RISKS PREVENTIVE CONTROL 1) The systems operator opened up a recently burned bag of microwave popcorn directly under a smoke detector in the computing room where two mainframes, three high-speed printers, and approximately 40 tapes are housed. The extremely sensitive smoke detector triggered the sprinkler system. Three minutes passed before the sprinklers could be turned off. 2) Jane, a secretary, was laid off. Her employer gave her three weeks' notice. After two weeks, Jane realized that finding another job was going to be very tough, and she began to get bitter. Her son told her about a virus that had infected the computers at school. He had a disk infected with the virus. Jane took the disk to work and copied the disk onto the network server, which is also connected to the company's mainframe. One month later, the company realized that some data and application programs had been destroyed. 3) Murray, a trusted employee and a systems engineer, had access to both the computer access control list and to user passwords. He was recently hired away by the firm's competitor for twice his old salary. After leaving, Murray continued to browse through his old employer's data, such as price lists, customer lists, bids on jobs, and so on. He passed this information on to his new employer
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
