Conduct a detailed investigation to aid the authorities

Assignment Help Computer Networking
Reference no: EM132476916

Section A: MULTIPLE CHOICE
Directions: Choose the correct answer by highlighting it with green.

Question 1. You are the senior administrator for a bank. A user calls you on the telephone and says they were notified to contact you but couldn't find your information on the company website. Two days ago, an email told them there was something wrong with their account and they needed to click a link in the email to fix the problem. Hey clicked the link and filled in the information, but now their account is showing a large number of transactions that they did not authorize. They were likely the victims of what type of attack?

A. Spamming
B. Phishing
C. Pharming
D. Escalating

Question 2. Assume that you are working as information security analyst in HSBC bank. You are asked to choose the right risk management tool that uses an expert knowledge database to walk the user through a risk assessment. Which of the following tool shall you select?

A. COBRA
B. FRAP
C. Risk Watch
D. OCTAVE

Question 3. ISACA refers to testing for strong controls. What is the best description of a strong control?
A. Effective implementation of multiple controls targeting the same objective.
B. Preventative controls that stop the problem from ever occurring.
C. Using at least one control in each of the three categories of preventative, detective, corrective.
D. Implementing comprehensive pervasive controls inside of an ERP application.

Question 4. An IS auditor is performing a review of an application and finds something that might be illegal. The IS auditor should do which of the following?
A. Disregard or ignore the finding because this is beyond the scope of this revew.
B. Conduct a detailed investigation to aid the authorities in catching the culprit.
C. Immediately notify the audience of the finding.
D. Seek legal advice before finishing the audit.

Question 5. What is the principal issue surrounding the se of CAAT?
A. The capability of the software vendor.
B. Possible cost, complexity, and the security of output.
C. Inability of automated tools to consider the human characteristics of the environment.
D. Documentary evidence is more effective.

Question 6. Which of the following information security model is a set of concepts and techniques that is used for managing IT infrastructure development and operations?

A. COSO
B. COBIT
C. ISO
D. ITIL

Question 7. Identify the name of the risk that may occur if the router does not catch spoofed IP addresses during audit process.

A. Inherent Risk
B. Control Risk
C. Detection Risk
D. Business Risk

Question 8. A risk is a likelihood of a threat source taking advantage of a vulnerability to an information system. Risks left over implementing safeguards s know as:

A. Leftover Risks
B. Residual Risks
C. Remaining Risks
D. Exposures

Question 9. The members of the audit committee must NOT be?
A. Financially illiterate
B. Composed of business executives
C. Provide advice to the executive accounting officer
D. Promoting positive working relationship

Question 10. What is the purpose of the audit charter?
A. To engage external auditors
B. To grant responsibility, authority, and accountability
C. To authorize the creation of the audit committee
D. To provide detailed planning of the audit

Section 2: ESSAY

Directions: Answer the following items. Write your answer under each question.

Question 1. During risk management planning your team has identified three risks with probabilities of 10%, 50%, ad 35%. If the first two risks occur, they will cost you 5,000 USD and 8,000 USD; however, if the third risk occurs it will give you benefit of 10,000 USD. Determine the expected monetary value of these risk events.

Question 2. The accounting section of SPUP requires an application to process expense vouchers. Each voucher must be input by one of many accounting clerks, verified by the clerk's applicable supervisor, and then reconciled by an auditor before the final settlement check is produced. Which access control technique should be built into the application to best serve these requirements and describe this access control in brief?

Question 3. BDO plays a leading role in developing e-banking services and looking for high standard security. The bank operates through a network of 54 branches and offices throughout the country and offers a wide range of products and services. It needs to follow an information security standard which is beneficial for all its 54 branch managers, IT users, and auditors. Which is the best information security standard is suitable for this? Describe the structure of this standard.

Question 4. Computer-Assisted Audit Techniques (CAATs) are a growing field within the audit profession that an auditor (external or internal) uses as Section of their audit procedures. As an auditor identify and list any four illegal activities that are found by CAAT tools during auditing stage.

Question 5. During audit planning, several documents are produced in support of their project. Which one is used to identify the members of the audit team according to the person responsible for specific tasks in order to gain funding and ensure quality?

Question 6. Assume that you are working as an information security analyst. You are asked to create MC Cumber Cube to find a solution for below mentioned problems. Develop a security assurance model by using MC Cumber Cube framework or this scenario.

376_figure.jpg

Domain Attack Vector Information State Countermeasure Security Goal

Question 7. You are asked to create evidence during our audit stage. Find out any two types of audit evidence ad provide the objective of the audit evidence with an appropriate example for each one.

Type of Audit Evidence Objective/Description

Section 3: ANALYTICAL QUESTIONS

Directions: Answer the following items. Write your answer under each item.

Question 1. A company is dedicated to offer a comprehensive range of security products and services which comply with the highest international industry standard requirements. It offers solutions in many security areas such as authentication, identity management, secure managed file transfer, data leakage prevention, network security, compliance certifications (ISO 27001), professional security services, information security training and digital forensics consulting.

This company is facing a number of information security threats. Using the following table, calculates SLE, ARO, and ALE for each threat category listed. [Just fill-in the blank cells].

Threat

Cost per Incident

Frequency of Occurrence

SLE

ARO

ALE

Programmers Mistake

$5000

1 per week

$5000

 

 

Denial of Service

$2500

1 per quarter

 

4

$10,000

Question 2. Assume that you are working as an auditor n BDO. As an auditor, give four (4) of your responsibilities while planning detailed audit objectives.

Question 3. Illustrate the overview of Audit Process Diagram.

Question 4. Read carefully the following Threat Rating Table which indicates the impact level of the risk in an organization.

Rating

High

(Impact Value is 3)

Medium

(Impact Value is 2)

Low

(Impact Value is 1)

Damage potential

The attacker can weaken the security system; get full trust authorization; run as administrator; upload content

Leaking sensitive information

Leaking nonsensitive information

Exploitability

A beginner programmer could make the attack in a short time.

A skilled programmer could make the attack.

The attack requires an extremely skilled person and in-depth knowledge every time to exploit.

Affected users

All uses, key customers

Some users

Very small percentage of users, affects unknown users

Based on the table above, fill-in the table below by specifying the impact level (High/Medium/Low) of the threat rating.

Threat Scenario

Damage Potential Rating

Exploitability Rating

Affected Users Rating

Attacker obtains authentication credentials by monitoring the network

High

 

 

SQL Injection Attacks

 

Low

 

Reference no: EM132476916

Questions Cloud

Create a working thesis statement and basic research plan : Conduct research on the topic and locate articles that takes a clear con position - proposal offers direction for research needs and gives your professor
BSBHRM602 Manage Human Resources Strategic Planning : BSBHRM602 Manage Human Resources Strategic Planning Assignment Help and Solution - Choice Business College, Australia. Discuss PEST analysis
Request email assignment : Request Email Assignment - While expert interviews are a common method for collecting qualitative research data, when a face-to-face meeting is not possible
Write the SQL INSERT statements to load the tables : MIS 315 Class Project - Write the SQL INSERT statements to load the tables with the specified data in your personal database in the AWS SQL Server
Conduct a detailed investigation to aid the authorities : Conduct a detailed investigation to aid the authorities in catching the culprit and An IS auditor is performing a review of an application and finds something
Advanced Cost Accounting Questions : Advanced Cost Accounting Questions - Is it possible to have more than one split off point in these processes? Why or why not
Behavior change assessment : Behavior Change Assessment - Identifying your Target Behavior and Why is Changing This Behavior Important - Creating a Plan for Changing your Behavior
CRJ 410 - Advanced Policing Innovations Assignment : CRJ 410 - Advanced Policing Innovations Assignment Help and Solution, California State University, East Bay, USA. What are main distinguishing characteristics
Write a love story story : Write a story of about 10 pages double spaced which should be a love story - from Your own idea

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd