Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 21
Quiz 11: Computer Crime and Information Technology Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
The CoBIT framework identifies seven information criteria; the FASB conceptual framework includes four qualitative characteristics of accounting information, as well as several assumptions, principles and constraints. Which of the following statements about them is most true?
Question 42
Essay
Fill in the blanks below with appropriate terminology from CoBIT. A. ______ auditors exchange information with one another to maintain strong corporate and IT governance. B. ______ is directly responsible for choosing a public accounting firm to do external audits. C. _______ holds IT and information security management accountable for value delivery, an element of IT governance. D. __________ should provide information about risk management, an element of IT governance, to the board of directors. E. Information about internal control flows two ways between the audit committee and ______. F. Internal auditors exchange various kinds of information with corporate employees in ______. G. Stakeholders rely on _____ for assurance about various forms of control. H. The board of directors provides information about _____ to shareholders and employees. I. Through the ___, external auditors interact with the corporate board of directors.j. Ultimately, ____ hold the board of directors accountable with respect to corporate governance. A. internal and externalb. the audit committeec. the board of directorsd. information technology and information security managemente. external auditorsf. information technology and information security managementg. external auditorsh. financial a
Question 43
Essay
Based on the list provided in the text, indicate the type of computer criminal described in each of the following. A. A young, inexperienced hacker who uses tools written by others for the purpose of attacking systems b. Could seriously disrupt power grids, telecommunications and transportation c. Hackers driven by financial gain d. Recruit talented hackers to handle the technical aspects of crime e. Someone who invades an information system for malicious purposes f. Take advantage of networked systems by turning to computer intrusion techniques to gather the information they desire g. The largest threat to a company's information systems
Question 44
Multiple Choice
PCA Corporation maintains its fixed asset records in an Excel spreadsheet, as well as in its general ledger software. An internal auditor for PCA downloaded the Excel spreadsheet, then verified the information in it against both the general ledger software and the actual fixed assets in use. Which of the following statements is most true?
Question 45
Multiple Choice
An organization that uses the CoBIT framework to strengthen internal controls wants to improve the confidentiality of its information. Which of the following internal controls will best help achieve that goal?
Question 46
Essay
List the elements of Carter's taxonomy of computer crime.
Question 47
Multiple Choice
CoBIT can be used to strengthen internal controls against computer crime by:
Question 48
Short Answer
The CoBIT framework can be used to strengthen internal controls against computer crime in various ways. Indicate whether each statement below is (a) always true, (b) sometimes true or (c) never true. a. As a form of internal control, each step of the systems development life cycle focuses on one of CoBIT's information criteria. b. CoBIT can be used in conjunction with the COSO internal control framework to identify appropriate control activities. c. CoBIT provides standards for evaluating information inputs and outputs that can help strengthen internal control. d. The board of directors, as part of the CoBIT accountability framework, helps create a strong environment that values internal control and risk management. e. The COSO enterprise risk management framework requires the use of CoBIT to identify risks.
Question 49
Essay
Jack conducted an Internet search for examples of computer crime that resulted in the items listed below. Which type of computer criminal is described in each? Be as specific as possible in your responses. A. Boris and Natasha coordinated ten people who sent out e-mails asking the recipients to purchase fake lottery tickets. B. Gil, an IT consultant for DMM Corporation, stole personal information about corporate executives and sold it to tabloid newspapers. C. Marie, the chief information officer of RBC Corporation, planted a logic bomb in case she ever lost her job. D. Timothy shut down traffic lights on a major street in his city in an effort to cause serious traffic accidents. E. Zachary used a computer program he found on the Internet to "kill" characters in an online game.
Question 50
Multiple Choice
The CoBIT framework looks at the issue of internal control from three points of view. An organization's hardware and software configuration is most closely related to:
Question 51
Multiple Choice
The CoBIT framework identifies seven information criteria; the FASB conceptual framework includes four qualitative characteristics of accounting information, as well as several assumptions, principles and constraints. Which of the following statements about them is most true?
Question 52
Essay
The chapter discussed the four elements of Carter's taxonomy of computer crime, eleven business risks / threats to information systems and seven common types of computer criminals. Classify each item below using each of them.
Question 53
Essay
Information technology controls can be classified as physical, technical or administrative. Consider each independent situation below; suggest one control from the indicated classification that would address (prevent / detect / correct) the risk.a) A bank's customer database is hacked.Administrative: _____________________________________________ b) A careless employee spills coffee on a network server.Physical: _____________________________________________ c) A corporation's sales data are manipulated by a member of the sales staff. Technical: _____________________________________________ d) A former employee introduces a logic bomb to a company's payroll system.Administrative: _____________________________________________ e) A political candidate's web site is defaced.Technical: _____________________________________________ f) A senior citizen sends money to a fake religious organization based on a fraudulent e-mail.Administrative: _____________________________________________ g) A waitress steals a customer's credit card number.Physical: _____________________________________________ h) An employee uses work time to shop online using the company's computer. Administrative: _____________________________________________ i) Corporate spies steal research and development information. Technical: _____________________________________________ j) Fake compromising photos of a corporate CEO are posted to a social networking site. Technical: _____________________________________________ A. regular security auditsb. encase the server in a cabinetc. system access logd. policy to remove employees from the system when they leave the companye. password rotationf. security trainingg. customers pay at the registerh. appropriate use poli
Question 54
Multiple Choice
The CoBIT framework looks at the issue of internal control from three points of view. If NTS Corporation's strategic plan includes a statement about planned increases in sales, which of the following statements is most true?
Question 55
Essay
The CoBIT framework identifies seven information criteria. In each example below, indicate one criterion that is met AND one that is not met in the space provided.
Question 56
Essay
Which element of Carter's taxonomy of computer crime is associated with each item below? A. Computer is not required for the crime but is related to the criminal act b. Computer is used to commit the crime c. Computer use may make a crime more difficult to trace d. Growth of the Internet creates new ways of reaching victims e. Objective is to impact the confidentiality, availability and / or integrity of data f. Presence of computers has generated new versions of fairly traditional crimes g. Targets the system or its data h. Technological growth creates new crime targets i. Use of the computer simplifies criminal actions j. Uses the computer to further a criminal end
Question 57
Multiple Choice
The CoBIT framework is divided into four domains of knowledge. Suppose TPC Corporation uses the systems development life cycle for new IT projects. Which of the following statements is most true?