Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Pick one of the problems below or describe a similar one from your own experience. Then describe how a control plan(s) from this chapter would

Pick one of the problems below or describe a similar one from your own experience. Then describe how a control plan(s) from this chapter would prevent (P) or detect (D) the problem. Minimum 200 words

  1. Criminals posing as small business owners obtained names, addresses, and social security numbers from an organization whose business is providing such information only to legitimate entities who have a legal reason to use the personally identifiable information (PII).
  2. An executive of a financial services firm implements a wireless network so that she can work at home from anywhere in her house. After setting up the network, she logs on using the default password.
  3. An organizations top salesman uses WhatsApp, a popular online messaging app. Such apps have been known to be vectors to "crack" or "hack" personal devices like Android & iPhone mobile phones: https://www.popularmechanics.com/technology/security/a30666361/jeff-bezos-whatsapp-hack/
  4. A financial analysts laptop was stolen from his car. The laptop contained the names, social security numbers and other personally identifiable information (PII) of 27,500 current and former employees.
  5. To keep track of the passwords used to access various computer systems, employees create Word documents listing their passwords and store the document with the name passwords.doc.
  6. Backup disks that included information on 3.9 million credit card customers were lost in transit to a credit bureau. Data included names, social security numbers, account numbers, payment histories and other personally identifiable information (PII).
  7. Private and sensitive information is sent to multiple persons via e-mail. The e-mails include all addressee names within the e-mail address list (instead of using the "BCC" or "blind carbon copy" field).
  8. An individual made millions by purchasing bank account information from eight employees of various banks. He had approximately 540,000 accounts in his database. Some bank employees were accessing up to 300 customer accounts each week to obtain the account information that they were selling.
  9. A third-party processor of credit card transactions allowed an unauthorized individual to infiltrate its network and access cardholder data.
  10. An individual sold his cell phone on eBay. The cell phone contained hundreds of confidential business-related e-mails.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Gleim CIA Review Part 3 Internal Audit Knowledge Elements

Authors: Irvin N. Gleim

2018 Edition

1618541153, 978-1618541154

More Books

Students also viewed these Accounting questions

Question

If a = 120?, ? 30 = 600 Ib F

Answered: 1 week ago