Chapter 3 CIS
Chapter 3 CIS
Review Questions
2. What are the three main tasks the operating system performs?
Response:
a. Translates high-level languages into the machine-level language the computer
can execute.
b. Allocates computer resources to users.
c. Manages the tasks of job scheduling and multiprogramming.
4. What are the four techniques that a virus could use to infect a system?
Response: The virus program can attach itself to
a. an .EXE or .COM file,
b. an OVL (overlay) program file,
c. the boot sector of a disk, or
d. a device driver program.
26. Networks would be inoperable without protocols. Explain their importance and
what functions they perform.
Response: Network protocols are the rules and standards governing the design of
hardware and software that permit users of networks manufactured by different vendors
to communicate and share data. Without protocols, data transmission between two
incompatible systems would be impossible. Protocols facilitate the physical connection
between the network devices. Protocols also synchronize the transfer of data between
physical devices. They provide a basis for error checking and measuring network
performance. They promote compatibility among network devices. Lastly, they promote
network designs that are flexible, expandable, and cost-effective.
31. What is a certification authority, and what are the implications for the
accounting profession?
Response: A certification authority is an independent and trusted third party
empowered with responsibility to vouch for the identity of organizations and individuals
engaging in Internet commerce. The question then becomes, who vouches for the CA?
How does one know that the CA who awarded a seal of authenticity to an individual is
itself reputable and was meticulous in establishing his or her identity? These questions
hold specific implication for the accounting profession. Since they enjoy a high degree
Discussion Questions
Response: A back door is created so that the programmer may gain future access
to the program without needing a user password (in other words after the programmer no
longer has a valid password). The backdoor may be used legitimately to gain easy access
to perform maintenance or it may be used by a programmer who has no legitimate reason
to be accessing the system in that manner or at all.
3. Discuss the issues that need to be considered before implementing keystroke
monitoring.
Response:
A Trojan horse is a program whose purpose is to capture IDs and passwords from
unsuspecting users. These programs are designed to mimic the normal log-on procedures
of the operating system. When the user enters his or her ID and password, the Trojan
horse stores a copy of them in a secret file. At some later date, the author of the Trojan
horse uses these IDs and passwords to access the system and masquerade as an
authorized user.
6. Discuss six ways in which threats from destructive programs can be substantially
reduced through a combination of technology controls and administrative procedures.
Response: The following examples controls and procedure that can reduce the
i. Purchase software only from reputable vendors and accept only those products
that are in their original, factory-sealed packages.
iii. Examine all upgrades to vendor software for viruses before they are
implemented.
iv. Inspect all public-domain software for virus infection before using.
vii. Install all new applications on a standalone computer and thoroughly test
them with antiviral software prior to implementing them on the mainframe or LAN
server.
vii. Routinely make backup copies of key files stored on mainframes, servers,
and workstations.
ix. Wherever possible, limit users to read and execute rights only.
x. Require protocols that explicitly invoke the operating system’s logon
procedures in order to bypass Trojan horses. Some operating systems allow the user to
directly invoke the operating system logon procedure by entering a key sequence such as
CTRL + ALT + DEL. The user then knows that the logon procedure on the screen is
legitimate.
xi. Use antiviral software (also called vaccines) to examine application and
operating system programs for the presence of a virus and remove them from the affected
program.
7. Explain the three ways in which audit trails can be used to support security objectives.
Response: Audit trails can be used to support security objectives in three ways:
Response: Users may share their passwords, write-down their passwords, or use
easily guessed passwords. Protection against these security breaches includes software
that allows only smart passwords and one-time passwords used in conjunction with smart
cards.
12. Explain how smurf attacks and SYN flood attacks can be controlled.
Response: In the case of a smurf attack, the targeted organization can program
their firewall to ignore all communication from the attacking site, once the attackers IP
13. Discuss the risks from equipment failure and how they can be controlled.
Response:
Risks: Transmissions between senders and receivers can be disrupted, destroyed,
or corrupted by equipment failures in the communications system. Equipment failure can
also result in the loss of databases and programs stored on the network server. The most
common problem in data communications is data loss due to line error. The bit structure
of the message can be corrupted through noise on the communications lines. Noise is
comprised of random signals that can interfere with the message signal when they reach a
certain level.
Controls:
i. Echo Check. The echo check involves the receiver of the message returning the
message to the sender. The sender compares the returned message with a stored copy of
the original. If there is a discrepancy between the returned message and the original,
suggesting a transmission error, the message is retransmitted.
ii. Parity Check. The parity check incorporates an extra bit (the parity bit) into the
structure of a bit string when it is created or transmitted. The value of the parity bit (1 or
0) is determined by the bit value of the character being transmitted. Parity can be both
vertical and horizontal (longitudinal). When the message is received, the parity is
checked again. A discrepancy in the parity bit value that is recalculated at the receiving
end indicates that a bit value in the character was changed during transmission.
14. Does every organization that has a LAN have need a firewall?
15. Describe three ways in which IPS can be used to protect against DDos attacks.
Response:
i. IPS can work inline with a firewall at the perimeter of the network to act as a
filer that removes malicious packets from the flow before they can affect servers and
networks.
ii. IPS may be used behind the firewall to protect specific network segments and
servers.
iii. IPS can be employed to protect an organization from becoming part of a
botnet by inspecting outbound packets and blocking malicious traffic before it reaches the
18. Explain the triple-DES encryption techniques known as EEE3 and EDE3.
Response: EEE3 uses three different keys to encrypt the message three times.
EDE3 uses one key to encrypt the message. A second key is used to decode it. The
resulting message is garbled because the key used for decoding is different from the one
that encrypted it. Finally, a third key is used to encrypt the garbled message. The use of
multiple keys greatly reduces the chances of breaking the cipher. Triple DES encryption
is thought to be very secure and is used by major banks to transmit transactions.
Unfortunately, it is also very slow.
Response: Sometimes DES and RSA are used together to create a digital
envelope that is both more secure and faster than using RSA encryption alone. The actual
message is encrypted using DES to provide the fastest decoding. The DES private key
needed to decrypt the message is encrypted using RSA and transmitted along with the
message. The receiver first decodes the DES key, which is then used to decode the
message.
22. Why is inadequate segregation of duties a problem in the personal computer
environment?
Response: Business travelers with laptop and notebook computers are just
beginning to realize how carefully they should safeguard their computers while traveling
on subways, planes, cars, and staying in hotels. Theft of these computers is becoming a
serious problem. These computers are being stolen just as often for the information
contained on the hard drives as they are for the resale values. Unfortunately, these stolen
computers often have the DES keys contained on floppy diskettes, which are stored in the
carrying cases. The carrying cases are usually also stolen, or the encryption keys may be
on the hard drive. Thus, the thief gains access to the key and can decode messages.
Response: One problem is ensuring that transactions are authorized and valid.
Both the customer and supplier must establish that the transaction being processed is with
a valid trading partner and is an authorized transaction. Another problem is that, in most
situations, the trading partners must agree to give their trading partner access to files,
which previously were entirely internal documents, such as inventory files. Prior to EDI,
firms did not exchange inventory file data. Thus, the accuracy of these files AT ALL
TIMES is crucial. Further, these files should not be allowed to be altered, in any fashion,
by the trading partner’s computer. Only the organizations application programs should be
allowed to process inventory records.
26. “In and EDI system, only the customer needs to verify that the order being
placed is from a valid supplier and not vice versa.” Do you agree with this
statement? Why or why not?
Response: The TCP portion of the TCP/IP protocol supports the transport
function of the OSI model. This ensures that the total number of data bytes transmitted
was received. The IP component provides the routing mechanism. Every server and
computer in a TCP/IP network requires an IP address, which is either permanently
assigned or dynamically assigned at startup. The IP part of the TCP/IP protocol supports
the network layer of the OSI model. It contains a network address and is used to route
messages to different networks. IP receives message packets from the transport protocol
and delivers them to the data link layer.
30. Distinguish between the FTP and TELNET protocols.
Response: FTP (File Transfer Protocol) is used to transfer text files, programs,
spreadsheets, and databases across the Internet. TELNET is a terminal emulation protocol
Response:
Better Business Bureau. The Better Business Bureau (BBB) is a non-profit
organization that has been promoting ethical business practices through self-regulation
since 1912. BBB has extended its mission to the Internet through a wholly owned
subsidiary called BBBOnline, Inc. To qualify for the BBBOnline seal an organization
must:
• Become a member of BBB.
• Provide information about the company’s ownership, management, address, and
phone number. This is verified by a physical visit to the company’s premises.
• Be in business for at least one year.
• Promptly respond to customer complaints.
• Agree to binding arbitration for unresolved disputes with customers.
The assurance provided by BBBOnline relates primarily to concerns about business
policies, ethical advertising, and consumer privacy. BBBOnline does not verify controls
over transaction-processing integrity and data-security issues.
TRUSTe. Founded in 1996, TRUSTe is a non-profit organization dedicated to improving
consumer privacy practices among Internet businesses and Web sites. To qualify to
display the TRUSTe seal the organization must:
• Agree to follow TRUSTe privacy policies and disclosure standards.
• Post a privacy statement on the Web site disclosing the type of information being
collected, the purpose for collecting information, and with whom it is shared.
32. Differentiate between a LAN and a WAN. Do you have either or both at your
university or college?
Response: The primary difference between LANs and WANs is the geographic
area coverage. LANs are typically confined to a single room, floor, or building. WANs
are used to connect various LANs and computing centers that are geographically
dispersed across distances that range from less than a mile to transcontinental.
Multiple-Choice Questions
1. B
2. A
3. A
4. C
5. A
6. A
Problems
1. Operating System and Network Control
Response: The company needs to make sure that the following items are included
in its system design:
Data encryption techniques for the sending of sensitive data from one file to another over
the LAN.
Access controls for files on the home computer.
Access controls for data on hard drives of the personal computers.
Back-up policy and procedures for data on the home computer and the PC’s.
Virus Protection for the home computer and for the PC’s.
Required:
a. What internal control problems do you find?
Response: There are a few security control problems within MM’s operating
system. First, access control is a problem because there is not secure protection from
unauthorized users. Also, there is a problem with malicious and destructive programs.
Controls that combine technology and administrative procedures need to be
implemented. There also is a lack of audit trail controls, which are needed for proper
accounting records.
Required: What control technique(s) discussed in this chapter could you use to
help detect this type of fraud?
Response: If the company uses a call back device, Charles Hart’s home phone
should not be on the approved phone list. Since Charles is an hourly worker, he should
not be expected to take work home with him. Further, a transaction log listing time of
data input and user ID would be informative to Charles’ boss. If Charles has not been
approved for overtime during the past month, and Charles’ supervisor notices that Charles
has entered some transactions into the system late in the evening, then Charles’
supervisor should investigate these actions. A message transaction, which contains a log
of users on the system by login time, would also be useful.
Response: The control over output documents (i.e. the MRP, inventory ordering
system, billing, sales order, accounts payable, and the operating manuals) was very weak.
These documents should not be discarded in a manner in which they can be retrieved and
read by anyone. Inadequate operating system controls were in place that allowed a Trojan
horse program to retrieve user ID’s and passwords. Management reports reflecting new
vendors, new suppliers, and new systems personnel ID’s were either not being prepared
or not being carefully reviewed. Inadequate reports reflecting changes to the transaction
log were being kept or the changes in them would have been noticed.
Required:
a. Identify and explain the data security and integrity problems that can occur.
b. For each problem identified, describe a control procedure that could be
employed to minimize or eliminate the problem.
Problem Identification and Explanation Control Procedure and Explanation
Establish access privileges based on need
Unauthorized access to the reporting system Implement Passwords and password
management procedures
6. Preventive Controls
Required: For each scenario, discuss the possible damages that can occur.
Suggest a preventive control.
Responses:
a. The intruder can then withdraw money from the ATM cardholder accounts.
(This actually happened in California; the intruder was a systems consultant who had
helped to set up the communication system.) Digital encoding of data with the algorithm
being changed periodically, especially after the systems consultants have completed their
jobs, and the system is in use.
b. Noise on the line may be causing line errors, which can result in data loss. Echo
checks and parity checks can help to detect and correct such errors.
c. If data is being lost, echo checks and parity checks should also help; however,
the problem may be that an intruder is intercepting messages and tampering with them.
Message sequence numbering will help to determine if messages are being lost, and if
they are perhaps a request-response technique should be implemented that makes it
difficult for intruders to circumvent.
d. If messages are being delayed, an important customer order or other information
could be missed. As in item c, message sequence numbering and request-response
techniques should be used.
Required: For each scenario, discuss the potential consequences and give a
prevention technique.
Responses:
a. A potential consequence is that hardware could be damaged if the sprinklers are
not strategically placed. Data losses could be incurred as well due to damaged storage
tapes. A corporate policy should be in place and strictly enforced banning food and drink
from this area. In case the alarms are set off, a water sprinkler system is not appropriate
due to the damage it can cause to a computer. The automatic fire extinguishing systems
should dispense an appropriate type of suppressant, such as carbon dioxide. Another
alternative is to have a warning sound that the automatic fire extinguishing system is
going to activate in a certain amount of time (maybe 5 seconds) if an override button is
not pushed. In the case of a fire, this will allow the systems personnel time to protect
themselves from the suppressant, which will be sprayed.
b. The exposure in this situation is that user IDs and passwords residing in main
memory will be dumped and used to gain unauthorized access to the system. One method
would be to configure the operating system so that in the case of a failure, the contents of
main memory is to be dumped to a disk file only. Further, a password, or maybe a
combination of passwords, should be necessary to retrieve the data from the disk.
c. Employees that have been terminated should also have their passwords expired
immediately. The network should require a password to log on.
d. The potential exposure is that data and/or application programs may ultimately
be lost if the virus is not caught before it causes damage. Antivirus software should be
placed onto the network server to prevent any files from being uploaded before they are
checked for viruses. Also, an antiviral program should examine the network server to
detect any viruses.
8. Encryption
Required: Determine the key used to produce the coded message and decode it.
10. Encryption