- Information
- AI Chat
Was this document helpful?
AIS 6 - AIS
Course: Accountancy (B113)
823 Documents
Students shared 823 documents in this course
University: University of Northern Philippines
Was this document helpful?
AIS 6: Information Security and Computer Fraud
Progress check:
1. What are the general goals of information security?
The general goals of information security are to safeguard critical systems and to maintain
confidentiality, integrity, and availability of information from internal and external security threats.
2. Give an example of social engineering.
Social engineering could be an attempt to trick someone into revealing information, such as a password,
that can be used to attack systems or networks. For example, a hacker may find a phone number of a
salesperson from the company’s website. The hacker then pretends that he is one of the IT staff working
at the helpdesk and calls the salesperson to ask for the salesperson’s password in “fixing” a problem on
accessing certain files. If the salesperson gives his or her password to the hacker, the hacker can obtain
access to the company’s network.
3. Can we use the symmetric-key encryption method to authenticate users? Why?
We cannot use the symmetric-key encryption method to authenticate users because both the sender
and the receiver are using the same key . This method does not provide a unique key for each user when
transmitting information among different parties.
4. What is a digital signature? Why do we need it?
A digital signature is a message digest encrypted using the sender’s private key. We use a digital
signature to achieve two purposes. The main purpose is to maintain data integrity. The second purpose
is to authenticate the sender. If the receiver can use the sender’s public key to decrypt the digital
signature, the receiver authenticates the sender. The receiver compares the calculated message digest
with the sent-over message digest to confirm data integrity.
5. Given your understanding of computer fraud, do you think it happens often? Why or why not?
Computer fraud includes a variety of illegal acts that involve a computer or network. If the internal
control of a company is not adequate, the wide use of technologies, computers, and other electronic
devices in the business world provides an environment for frequent occurrences of computer fraud.
6. Use the fraud triangle to explain one of the fraud schemes.
Scenario one: The loose access control of the company’s information system provided the employee an
opportunity to obtain confidential information after leaving the position. The associate lured the
employee to disclose the confidential information for his business by providing financial benefits to the
employee. The employee committed the identity theft. She rationalized her behavior—because her
position had changed, she was no longer responsible for keeping employees’ account information
confidential.