Question: ( b ) High reliance on computer technology can lead to social impact and damage to individuals and organizations, as follows: ( i ) Apple

(b) High reliance on computer technology can lead to social impact and damage to individuals and organizations, as follows:
(i) Apple Inc. invested millions of dollars in new computerized software applications for its mobile phone, tablet and computer. Its IT Systems noted unauthorized intruders attempted to copy the new software for their personal benefits.
(ii) During an online exam, the IT Department noted their exam system had been breached for access to the questions and answers before the actual exam.
(iii) A company's secret information was held by an intruder through its "ransom virus". The intruder demanded millions of dollars be paid before the information could be released.
(iv) Lilian secretly stole access to the Human Resource Department system and approved her own outstation claim without attaching the required documentation as proof.
(v) Unauthorised, unwanted and unsubscribed information was bombarded into a person's email.
Required:
For each of the above, address the computer ethical issue and define the terminology used on the issue.
(15 marks)(Guration 6)
(a) Affin Bank's computerised internet banking system is programs with a firewall, which an attacker requires 6 minutes to penetrate. Then another intrusion system is able to detect that the hack is in progress after 2 minutes of breaking in. The security system is able to reset and reprogram itself to stop the breaking process within 3 minutes after the attacker started.
Required:
i. Based on the above, explain THREE (3) levels of internal control implemented in the computerised internet banking system.
(5 marks)
ii. Using the formula method, justify whether Affin Bank has implemented effective system security.
(b) Affin Bank offers online internet banking for customers transferring money to another account holder. Identify FIVE (5) types of system security that must be implemented in the process, address their purpose and provide ONE (1) example for each type of security.
(15 marks)
END OF QUESTION
( b ) High reliance on computer technology can

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!