Which element(s) of Carters taxonomy apply to each of the following situations? If more than one category
Question:
a. A bookkeeper steals cash as it comes into the company. The bookkeeper later falsifies accounting entries using general ledger software to cover the trail.
b. A bored teenager initiates a denial-of-service attack on his Internet service provider’s information system.
c. A disgruntled employee uses a previously installed “back door” into an information system to lock out other users by changing their passwords.
d. A gang of criminals breaks into a local retail store. They steal all the store’s computers and then later hack into them for the purpose of identity theft.
e. A pair of computer criminals uses e-mail to contact victims for an illegal pyramid scheme. They use money from new investors, rather than profits, to pay off old investors, keeping most of the money themselves.
f. A recently fired employee laid the groundwork for corporate espionage by installing spy-ware on the company’s network.
g. A student discovers the password to his university’s information system. He then hacks the system to change grades for himself and his friends.
h. A woman impersonates her wealthy employer, stealing personal information about the employer from her bank’s information system.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Accounting Information Systems basic concepts and current issues
ISBN: 978-0078025334
3rd edition
Authors: Robert Hurt
Question Posted: