All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
understanding cross cultural management
Questions and Answers of
Understanding Cross Cultural Management
2. How does SOX Section 302 attempt to deter fraud?
1. What is the purpose of an internal control?
Repeated duplicate payments
Customers complaining about double billing
A major increase in business with one particular customer
A large drop in profits
Employees who do not take vacations or go out of their way to work overtime
Disparity between accounts payable and receivable
Numerous outstanding checks or bills
Holes in accounting records
Delayed bank deposits
Missing the documents
Safeguarding of assets
Regulations and policies
Compliance with laws
Operational efficiency
Reliability of financial reporting
6. What should organizations do to reduce risks from wireless networks?
5. How can wireless APs put a company at risk?
4. What can firewalls not protect against?
3. Define authorization.
2. Define perimeter security.
1. What are network access control (NAC) products?
5. What is endpoint security?
4. What are biometric controls? Give two examples.
3. Define access control.
2. What are general controls?
1. What are the major objectives of a defense strategy?
Holding periodic random audits of the system
Instituting separation of duties, namely, dividing sensitive computer duties among as many employees as economically feasible in order to decrease the chance of intentional or unintentional damage
Insisting on security bonds or malfeasance insurance for key employees
Developing programming and documentation standards (to make auditing easier and to use the standards as guides for employees)
Requiring periodic modification of access controls (such as passwords)
Immediately revoking access privileges of dismissed, resigned, or transferred employees
Fostering company loyalty
Appropriately selecting, training, and supervising employees, especially in accounting and information systems
5. Explain how identity theft can occur
4. Explain why data on laptops and computers should be encrypted.
3. How can internal fraud be detected?
2. How can internal fraud be prevented?
1. Define fraud and insider occupational fraud.
12. Define botnet and explain its risk.
11. Define and give two examples of an intentional threat.
10. Define and give two examples of an unintentional threat.
9. Why do companies need an enforced AUP?
8. What is an acceptable use policy (AUP)?
7. Why is money laundering a national security threat?
6. Explain phishing.
5. What is a service pack?
4. What is time-to-exploitation?
3. Give an example of a weak and a strong password.
2. What is the purpose of passwords, firewalls, and intrusion-detection systems (IDS)?
1. Explain confidentiality, integrity, and availability.
3. Misunderstanding the effects of adding incompatible software to an existing system
2. Malfunctioning systems
1. Mistakes or human error
7. Why are government agencies and organizations imposing do-not-carry rules?
6. Why do most data breaches go unreported?
5. What are the motives of LulzSec and Anonymous?
4. Explain why advanced persistent threat (APT) attacks are one of the most dangerous cyber threats.
3. Explain why hackers and corporate spies use social engineering.
2. Why are cyberattacks on critical infrastructure particularly dangerous?
1. Define national critical infrastructure. Give three examples.
Recover from business disasters and disruptions quickly Business policies, procedures, training, and disaster recovery plans as well as hardware and software technologies play critical roles in
Maintain internal controls to prevent unauthorized alteration of data and records
Detect, diagnose, and respond to incidents and attacks in real time
Prevent attacks by having network intrusion defenses in place
Insure compliance with government regulations and laws
Promote secure and legal sharing of information among authorized persons and partners
Implement and enforce procedures and acceptable use policies (AUPs) for data, networks, hardware, and software that are company-owned or employee-owned as discussed in the opening case
Make data and documents available and accessible 24/7 while simultaneously restricting access
. How do you achieve the right balance to protect the enterprise’s security and the employee’s privacy? What is the right balance of security and privacy?
b. Would you feel confident that your privacy was protected using Toggle?Debate
a. How is access to the work container protected? What determines the strength of this protection?
7. View the brief video titled “Learn More About AT&T Toggle.” Find the link in the Chapter 5 Link Library on the book’s web site, or visit wireless.att.com and search for the title
Wipe all corporate data stored in work mode if an employee leaves the company or loses the device.
Add, update, and delete business applications on employees’ personal devices.
Manage and monitor employee access to company resources.
To what extent are users willing to give up convenience for their own security? And for the security of their companies?
6. With just a smartphone, users can conduct nearly all their banking business at any time.The level of flexibility and convenience opens up new avenues for fraud and cybercrime.
5. How does AT&T Toggle attempt to resolve the challenges you identified in question #4?
4. Identify and discuss four key challenges of BYOD.
3. What contributed to BYOD acceptance?
2. Why had organizations initially rejected the idea?
1. Explain the pressures driving the BYOD trend.
Breached Protected Health Information References
Data Analysis & Decision Making: Financial Impact of
Case 3, Video case: Cars, Appliances Could Be Hack Targets
Case 2, Business Case: Army Deploys Androids, Securely
Collaborative Work
Online Activities
Questions for Discussion & Review
IT and Data Management Decisions
Evaluate and Expand Your Learning
5.7 Business Continuity and Auditing Key Terms Chapter 5 Link Library
5.6 Internal Control and Compliance
5.5 Network Security
5.4 Information Assurance and Risk Management
5.3 Defending Against Fraud
5.2 IT Vulnerabilities and Threats
Showing 1700 - 1800
of 3266
First
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Last