Question
A) Do they have an internet that uses Transmission Control Protocol / Internet protocol (TCP/IP) heavily?
B) Do they have any security software installed? C) What would be your major security concerns?
urity Issues (ase 10: Real-Wire re u in Chicago. It is currently under contract to the Department of Treasury wo public electronic funds transfer (EFT) network with its head office and major com- and EFT initiatives when federal systems are overloaded. They have handled Wire is a pater switch sist in e-commerce to the Department of Ireasury to which has increased their workload by 15-20% on occasions. The company vitches in each capital city throughout the United States, including Alaska and e linked into a national communications network. Approximately 200 financial (banks, building societies, and credit unions) use the network to provide automatic EFT hat audit evidence is computer sv Hawal i, which are lle machine and point-of-sale services to their customers Ral-Wire has only been in operation for 15 years, but during that time it has been very suc stil.When the United States began to deregulate its financial markets in 1985 and foreign anks began to enter the marketplace, Real-Wire obtained substantial new business because it ould offer these financial institutions immediate EFT services key system. Y As a consultant specializing in computer controls and audit, you have been hired by the man- stem or invest in ging director of Real-Wire to examine the state of controls within the EFT system. She explains you that an increasing number of potential customers are requesting some type of independent ner. The syscm urance that controls within the system are reliable. Accordingly, she has decided to initiate a ent of the cmauatrols review of the entire system so that a third-party "letter of comfort" can be provided to run. Your com- ptential customers part of your controls review focuses on the main switch in Chicago. As part of your planning for the switch. In terms of short-term you examine the status of disaster recovery controls appear to be in place and working. Backup tapes for all data and prog protocols rt of the CPAThe rams are of-site to enable recovery if programs and data are lost for some reason. In or short-term recovery are well documented, and operators seem familiar with n these protocols. From time to time they have to exercise these protocols because lawsuit