Study the scenario and complete the question(s) that follow: John owns MXY, a small company that...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Study the scenario and complete the question(s) that follow: John owns MXY, a small company that sells books. John also doubles as the accountant for the business. John is the only one who creates the financial reports at the end of each month. When John is not on the business premises, the Credit Controller is given John's password to log in and carry out some basic functions in the accountant's profile. John had been advised to give the Credit Controller access to some of the functionalities that they are likely to need from the accountant's profile. Unfortunately, John did not have the time to add some of those functionalities to the Credit Controller's profile in the system. Since John travels a lot, he has a book with of passwords that he keeps at home. If John is out of the office and unreachable, the Credit Controller can always call John's house and request the password. At the end of the financial month in August, John realised that some unauthorised payments had been approved from the system on the day that he was in the office. However, he had not authorised those payments. Upon checking further into the system, other transactions that were not sanctioned by him were processed in the months of June and July of the same financial year. Source: Mapaso, N. (2020) Question 6 Advise John on which social engineering techniques could have been used to facilitate the creation of the unauthorised payments from the system by an employee in the Credit Controller's office. (20 Marks) Question 7 Assuming that they had not been in John's office or called John's home, how do you think the unauthorised user had managed to gain access to John's passwords? What are the possible solutions to each of the methods? (20 Marks) Question 8 How can the Systems Administrator setup John's business computer system to have secure passwords if they are running a Windows operating system network? (20 Marks) End of Section B Question 1 Identify and describe two types of malware that can affect your computer. Question 2 Describe in detail why a Systems Administrator has to restrict user privileges on their workstations. (10 Marks) (10 Marks) Question 3 How does a system attacker blindside the user into believing that they are working in the system that they normally use for their day to day transactions? (10 Marks) Question 4 Which methods can an aggrieved company use to make all of your company servers unusable or experience massive delays in processing information? (15 Marks) Question 5 5.1 How do you create security for a computer with Windows 10 to allow the allocated user to go for a tea break without switching off the computer? (7 Marks) End of Section A 5.2 What are the steps that you would follow to allow a new user to have access to the system network? (8 Marks) [Sub Total 15 Marks] Study the scenario and complete the question(s) that follow: John owns MXY, a small company that sells books. John also doubles as the accountant for the business. John is the only one who creates the financial reports at the end of each month. When John is not on the business premises, the Credit Controller is given John's password to log in and carry out some basic functions in the accountant's profile. John had been advised to give the Credit Controller access to some of the functionalities that they are likely to need from the accountant's profile. Unfortunately, John did not have the time to add some of those functionalities to the Credit Controller's profile in the system. Since John travels a lot, he has a book with of passwords that he keeps at home. If John is out of the office and unreachable, the Credit Controller can always call John's house and request the password. At the end of the financial month in August, John realised that some unauthorised payments had been approved from the system on the day that he was in the office. However, he had not authorised those payments. Upon checking further into the system, other transactions that were not sanctioned by him were processed in the months of June and July of the same financial year. Source: Mapaso, N. (2020) Question 6 Advise John on which social engineering techniques could have been used to facilitate the creation of the unauthorised payments from the system by an employee in the Credit Controller's office. (20 Marks) Question 7 Assuming that they had not been in John's office or called John's home, how do you think the unauthorised user had managed to gain access to John's passwords? What are the possible solutions to each of the methods? (20 Marks) Question 8 How can the Systems Administrator setup John's business computer system to have secure passwords if they are running a Windows operating system network? (20 Marks) End of Section B Question 1 Identify and describe two types of malware that can affect your computer. Question 2 Describe in detail why a Systems Administrator has to restrict user privileges on their workstations. (10 Marks) (10 Marks) Question 3 How does a system attacker blindside the user into believing that they are working in the system that they normally use for their day to day transactions? (10 Marks) Question 4 Which methods can an aggrieved company use to make all of your company servers unusable or experience massive delays in processing information? (15 Marks) Question 5 5.1 How do you create security for a computer with Windows 10 to allow the allocated user to go for a tea break without switching off the computer? (7 Marks) End of Section A 5.2 What are the steps that you would follow to allow a new user to have access to the system network? (8 Marks) [Sub Total 15 Marks]
Expert Answer:
Answer rating: 100% (QA)
1 1 Vir uses A virus is a type of malware that can replicate itself and spread to other computers It can attach itself to files or programs and then spread to other computers when those files or progr... View the full answer
Related Book For
Federal Taxation 2016 Comprehensive
ISBN: 9780134104379
29th edition
Authors: Thomas R. Pope, Timothy J. Rupert, Kenneth E. Anderson
Posted Date:
Students also viewed these general management questions
-
John Freeman is investing $8,006 at the end of each year in a fund that earns 6% interest. Click here to view factor tables In how many years will the fund be at $92,000? (Round answer to 0 decimal...
-
John makes deposits of $P at the end of each year for the first n years, $2P at the end of each year for the next n years, and so on, and finally $mP at the end of cach year for the last n years....
-
Given the following cash inflow at the end of each year, what is the future value of this cash flow at 6%, 9%, and 15% interest rates at the end of the seventh year? Year 1 ...... $15,000 Year 2...
-
Mick Stone disposed of the following assets during tax year 2020-21: (1) On 19 May 2020, Mick sold a freehold warehouse for 522,000. This warehouse was purchased on 6 August 2008 for 258,000, and was...
-
Steam enters a turbine, operating at steady state, at 5000 kPa and 500oC with a mass flow rate of 5 kg/s. It expands in an isentropic manner to an exit pressure of 10 kPa. Determine (a) The exit...
-
Dori Cruz started an interior design company called Interiors by Design, Inc., on April 1, 2018. The following amounts summarize the financial position of her business on April 14, 2018, after the...
-
Exercise 3.31 introduced the dataset StatisticsPhD, which gives enrollment for all 82 graduate statistics programs in the US in 2009. Use StatKey or other technology to generate a sampling...
-
The U.S. Energy Department states that 60% of all U.S. households have ceiling fans. In addition, 29% of all U.S. households have an outdoor grill. Suppose 13% of all U.S. households have both a...
-
Explain why special events have arisen in human civilization, why they are so popular, and how they contribute to community development and benefit stakeholders and host communities. Describe the...
-
The operations manager at Sebago Manufacturing is considering three proposals for supplying a critical component for its new line of electric watercraft. Proposal one is to purchase the component,...
-
Estimate an appropriate cost of capital benchmark for a short-term risky project based on the following data: YTM on T-bills = 2.6% YTM on T-bonds = 4.1% Historical arithmetic equity premium over...
-
Briefly discuss the strengths and limitations associated with this approach and the specific design. Develop a hypothetical research scenario that would necessitate the use of the Qualitative Method...
-
Viral genomes can be a. DNA or RNA. b. single-stranded or double-stranded. c. linear or circular. d. All of the above can characterize a viral genome.
-
Reals Bees makes products for personal care and sells through retail outlets and grocery stores. Its product line includes products for facial and body skin care, lip care, baby care, and outdoor...
-
1. Sorenson County established a self-insurance program in 20X8 by transferring $2 million of General Fund resources to an Internal Service Fund that is to be used to account for the county's...
-
Margaret Klines accounts are to record the following assets: On 1 August 2021 office furniture was purchased at a cost of $13 860 ($12 600 + $1260 GST) with a residual value estimated at $660 ($600 +...
-
Let f RR be a continuously differentiable function, with f(0) 0. Evaluate = 73 lim n L f(x)dx. nX 0
-
Archangel Corporation prepared the following variance report. Instructions Fill in the appropriate amounts or letters for the question marks in the report. ARCHANGEL CORPORATION Variance...
-
The TUV Partnership is considering two compensation schemes for Tracy, the partner who runs the business on a daily basis. Tracy can be given a $10,000 guaranteed payment, or she can be given a...
-
Refer to the preceding problem. In preceding problem Carls tax liability for last year was $19,000, and his AGI did not exceed $150,000. Carl requests an automatic extension for filing his current...
-
Identify the type of each of the following reorganizations. a. Briggs Corporation was originally incorporated in Georgia but now conducts most of its business in Florida. The firm transfers...
-
Figure 4.11 shows the \(v_{x}(t)\) curves for a collision between two identical carts moving not on a low-friction track but rather on a rough surface, so that friction affects their motion. Are the...
-
(a) Classify and give examples of the kinds of processes that can change (i) the number of loaves of bread in a bakery, (ii) the number of Lego pieces inside a house, and (iii) the number of coins in...
-
Cite at least two possible choices of system in each of the following situations. For each choice, make a sketch showing the system boundary and state which objects (excluding air) are inside the...
Study smarter with the SolutionInn App