Describe the chain of events that exposed the company

Assignment Help Accounting Basics
Reference no: EM133017227

1. What can a person to avoid getting victimized by a spoofing attack?

2. What do you think is the motivation for denial-of-service attacks?

3. Why is a distributed denial-of-services deemed more destructed than a regular DoS attack?

4. Why is public key encryption deemed more secured compared to private key encryption?

Albuj Salim is a newly hired accountant of Garozza Publishing House. She is an active member in a social media community. During her lunch break, she decided to access her social media account in her office computer. Her company's internet connection does not block access to any website in the internet. While browsing through her feeds, she mistakenly click on a link that opened a pop-up window that immediately closed after a few seconds. Since nothing happened, she decided to close her web browser and return to work. Before the day ended, she sent an e-mail to Bolch Corporation, a Germany-based ink supplier, to confirm the receipt of an invoice amounting to $30,000 and requested for bank details to process the payment of the invoice through a fund transfer.

Two days later, Salim received a reply from Bolch's accountant that instructs her to effect payment to an account number named under Blobolsch Inc. The e-mail also stated that Bolch has already changed its name in their local securities regulator and is still in the process of updating all corporate documents. Salim processed the payment using the information stated in the e-mail and the payment was approved by her superior.

A month after the wire transfer, Salim received another email from Bolch that is following-up the payment on the last invoice sent. Sethi argued that the invoice was already paid through a fund transfer, and forwarded to Bolch a copy of the fund transfer form and the e-mail received a month ago. Bolch denied Salim's claims and said that they did not receive the funds, nor provided Salim their bank details.

Upon discovery of the irregularity, the case was subjected to an investigation and the IT team was instructed to trace the source of the fake e-mail. Upon tracing by the company's IT personnel, it was discovered that the e-mail originated from Tokyo, Japan.

Requirement:

a. Describe the chain of events that exposed the company to networks risks, causing financial losses.

b. What actions that the company should have taken in order to prevent this situation?

Reference no: EM133017227

Questions Cloud

Digital financial services : Is Fintech influx into South Africa going to be disruption to the existing financial industry?
Demonstrate the use of shared or familiar experiences : Demonstrate the use of shared or familiar experiences, resources, and materials to meet the children's individual preferences and to prompt extensions of play
Create value by making or saving money : Take any new process, procedure, or system that will Create Value by Making or Saving Money.
What are the pressures when you are handling labor cost : 1. What are the pressures when you are handling labor cost? 2. How are you going to minimize customer complaints using staffing methods?
Describe the chain of events that exposed the company : Describe the chain of events that exposed the company to networks risks, causing financial losses and What actions that the company should have taken in order
Explain the importance of taking organisational requirements : Explain the importance of taking organisational requirements into account when identifying and implementing learning and development needs.
Elements from the theory to the variables of study : Choose an appropriate theory or model to motivate(Find from journal/google scholar)
Contrast three different health care service organizations : Apply and identify motivation strategies implemented by health care managers that can be used to motivate employees.
What is the impact on stirlings employment income : What is the impact on Stirlings employment income - Stirling owns a vehicle which he is required to use in his duties of employment.

Reviews

Write a Review

Accounting Basics Questions & Answers

  How much control does fed have over this longer real rate

Hubbard argues that the Fed can control the Fed funds rate, but the interest rate that is important for the economy is a longer-term real rate of interest.   How much control does the Fed have over this longer real rate?

  Coures:- fundamental accounting principles

Coures:- Fundamental Accounting Principles: - Explain the goals and uses of special journals.

  Accounting problems

Accounting problems,  Draw a detailed timeline incorporating the dividends, calculate    the exact Payback Period  b)   the discounted Payback Period. the IRR,  the NPV, the Profitability Index.

  Write a report on internal controls

Write a report on Internal Controls

  Prepare the bank reconciliation for company

Prepare the bank reconciliation for company.

  Cost-benefit analysis

Create a cost-benefit analysis to evaluate the project

  Theory of interest

Theory of Interest: NPV, IRR, Nominal and Real, Amortization, Sinking Fund, TWRR, DWRR

  Liquidity and profitability

Distinguish between liquidity and profitability.

  What is the expected risk premium on the portfolio

Your Corp, Inc. has a corporate tax rate of 35%. Please calculate their after tax cost of debt expressed as a percentage. Your Corp, Inc. has several outstanding bond issues all of which require semiannual interest payments.

  Simple interest and compound interest

Simple Interest, Compound interest, discount rate, force of interest, AV, PV

  Capm and venture capital

CAPM and Venture Capital

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd