INTRODUCTION TO ACCOUNTING INFORMATION SYSTEM
ACCT 402
ASSIGNMENT 2
1. Compare and contrast the following three frameworks: COBIT,
COSO Integrated Control, and ERM.
2. What motives do people have for hacking? Why has hacking
become so popular in recent years? Do you regard it as a crime?
Explain your position.
3. Do you agree that the most effective way to obtain adequate
system security is to rely on the integrity of company employees?
Why or why not? Does this seem ironic? What should a company
do to ensure the integrity of its employees?
4. Why do viruses represent a serious threat to information systems?
What damage can a virus do to a computer system?
5. Which preventive and detective, controls would best diminish the
following threat?
a. A salesperson successfully logged into the payroll system by
guessing the payroll supervisor’s password.
Sun | Mon | Tue | Wed | Thu | Fri | Sat |
---|---|---|---|---|---|---|
27 | 28 | 29 | 30 | 1 | 2 | 3 |
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 | 31 |