(SM) Chapter 3
(SM) Chapter 3
REVIEW QUESTIONS
2. What are the three main tasks the operating system performs?
Response:
a. Translates high-level languages into the machine-level language the computer can
execute.
b. Allocates computer resources to users.
c. Manages the tasks of job scheduling and multiprogramming.
4. What are the four techniques that a virus could use to infect a system?
Response: The virus program can attach itself to
a. an .EXE or .COM file,
b. an OVL (overlay) program file,
c. the boot sector of a disk, or
d. a device driver program.
21. At what three points in an electronic data interchange transaction and validation
process can authorization and validation be accomplished?
Response:
a. At the VAN level: The vendor logon is validated by comparing vendor passwords and
IDs against a valid master file.
b. Before being converted: The translation software validates the trading partner’s
password and ID against a valid master file.
c. Before processing: the trading partner’s application software references the valid
customer and vendor files to validate the transaction.
26. Networks would be inoperable without protocols. Explain their importance and
what functions they perform.
Response: Network protocols are the rules and standards governing the design of
hardware and software that permit users of networks manufactured by different vendors
to communicate and share data. Without protocols, data transmission between two
incompatible systems would be impossible. Protocols facilitate the physical connection
between the network devices. Protocols also synchronize the transfer of data between
physical devices. They provide a basis for error checking and measuring network
performance. They promote compatibility among network devices. Lastly, they promote
network designs that are flexible, expandable, and cost-effective.
31. What is a CA (certification authority), and what are the implications for the
accounting profession?
Response: A certification authority is an independent and trusted third party empowered
with responsibility to vouch for the identity of organizations and individuals engaging in
Internet commerce. The question then becomes, who vouches for the CA? How does
one know that the CA who awarded a seal of authenticity to an individual is itself
reputable and was meticulous in establishing his or her identity? These questions hold
specific implication for the accounting profession. Since they enjoy a high degree of
public confidence, public accounting firms are natural candidates for certification
authorities.
DISCUSSION QUESTIONS
1. Why is human behavior considered one of the biggest potential threats to operating
system integrity?
Response: Unfortunately, some computer hackers enjoy the challenge of creating
devices, such as viruses and logic bombs, to damage systems. They gain nothing of
monetary or financial value; they just enjoy knowing they accomplished their goal of
penetrating and affecting an operating system.
2. Why would a systems programmer create a back door if he or she has access to the
program in his or her day-to-day tasks.
Response: A back door is created so that the programmer may gain future access to the
program without needing a user password (in other words after the programmer no longer
has a valid password). The backdoor may be used legitimately to gain easy access to
perform maintenance or it may be used by a programmer who has no legitimate reason to
be accessing the system in that manner or at all.
4. Explain how an access token and an access control list are used to approve or deny
access.
Response: When a log-on attempt is successful, the operating system creates an access
token that contains key information about the user, including user ID, password, user
group, and privileges granted to the user. The information in the access token is used to
approve all actions the user attempts during the session. An access control list is assigned
to each IT resource (computer directory, data file, program, or printer), which controls
access to the resources. These lists contain information that defines the access privileges
for all valid users of the resource. When a user attempts to access a resource, the system
compares his or her ID and privileges contained in the access token with those contained
in the access control list. If there is a match, the user is granted access.
7. Explain the three ways in which audit trails can be used to support security
objectives.
Response: Audit trails can be used to support security objectives in three ways:
i. detecting unauthorized access to the system,
ii. reconstructing events, and
iii. promoting personal accountability.
9. Many authorities believe that the employer does not prosecute 90 percent of all
computer fraud acts. What do you think accounts for this lack of prosecution?
Discuss the importance of the establishment of a formal policy for taking
disciplinary (or legal) action against security violations.
Response: A common belief by management of publicly traded firms is that the public
will perceive fraudulent acts that have taken place as a sign of control weaknesses. The
management teams may prefer to handle the computer fraud by dismissal of the employee
rather than have the stockholders and analysts lose faith in the internal control procedures
of the firm. Unfortunately, this type of behavior by employers sends the wrong message
to potential perpetrators. The message from top management needs to be clear regarding
fraudulent acts-they will not be tolerated and any acts will be prosecuted. The message
means absolutely nothing if the firm does not back up this policy with actions if such
crimes are committed.
10. How can passwords actually circumvent security? What actions can be taken to
minimize this?
Response: Users may share their passwords, write-down their passwords, or use easily
guessed passwords. Protection against these security breaches includes software that
allows only smart passwords and one-time passwords used in conjunction with smart
cards.
12. Explain how smurf attacks and SYN flood attacks can be controlled.
Response: In the case of a smurf attack, the targeted organization can program their
firewall to ignore all communication from the attacking site, once the attackers IP address
is determined. In the case of SYN Flood, two things can be done:
i. Internet hosts can program their firewalls to block outbound message packets that
contain invalid internal IP addresses.
ii. Security software can scan for half-open connections that have not been followed by
an ACK packet. The clogged ports can then be restored to allow legitimate connections to
use them.
13. Discuss the risks from equipment failure and how they can be controlled.
Response:
Risks: Transmissions between senders and receivers can be disrupted, destroyed, or
corrupted by equipment failures in the communications system. Equipment failure can
also result in the loss of databases and programs stored on the network server. The most
common problem in data communications is data loss due to line error. The bit structure
of the message can be corrupted through noise on the communications lines. Noise is
comprised of random signals that can interfere with the message signal when they reach a
certain level.
Controls:
i. Echo Check. The echo check involves the receiver of the message returning the
message to the sender. The sender compares the returned message with a stored copy of
the original. If there is a discrepancy between the returned message and the original,
suggesting a transmission error, the message is retransmitted.
ii. Parity Check. The parity check incorporates an extra bit (the parity bit) into the
structure of a bit string when it is created or transmitted. The value of the parity bit (1 or
0) is determined by the bit value of the character being transmitted. Parity can be both
vertical and horizontal (longitudinal). When the message is received, the parity is
checked again. A discrepancy in the parity bit value that is recalculated at the receiving
end indicates that a bit value in the character was changed during transmission.
iii. Network Backup. Data backup in networks is accomplished in several different ways
depending on the network’s complexity.
15. Describe three ways in which IPS can be used to protect against DDos attacks.
Response:
i. IPS can work inline with a firewall at the perimeter of the network to act as a filer that
removes malicious packets from the flow before they can affect servers and networks.
ii. IPS may be used behind the firewall to protect specific network segments and servers.
iii. IPS can be employed to protect an organization from becoming part of a botnet by
inspecting outbound packets and blocking malicious traffic before it reaches the Internet.
18. Explain the triple-DES encryption techniques known as EEE3 and EDE3.
Response: EEE3 uses three different keys to encrypt the message three times. EDE3
uses one key to encrypt the message. A second key is used to decode it. The resulting
message is garbled because the key used for decoding is different from the one that
encrypted it. Finally, a third key is used to encrypt the garbled message. The use of
multiple keys greatly reduces the chances of breaking the cipher. Triple DES encryption
is thought to be very secure and is used by major banks to transmit transactions.
Unfortunately, it is also very slow.
23. Why is the request-response technique important? Discuss the reasons an intruder
may wish to prevent or delay the receipt of a message.
Response: This method is important in order to prevent intruders from preventing or
delaying messages. An intruder might intercept data such as credit card numbers and
expiration dates or bank debit cards and personal identification numbers in order to use
this data to commit crimes. Another possibility is that sales orders could be intercepted
and destroyed in a malicious attempt to sever customer-supplier relations.
24. Discuss how the widespread use of laptop and notebook computers is making data
encryption standards more easily penetrable.
Response: Business travelers with laptop and notebook computers are just beginning to
realize how carefully they should safeguard their computers while traveling on subways,
planes, cars, and staying in hotels. Theft of these computers is becoming a serious
problem. These computers are being stolen just as often for the information contained on
the hard drives as they are for the resale values. Unfortunately, these stolen computers
often have the DES keys contained on floppy diskettes, which are stored in the carrying
cases. The carrying cases are usually also stolen, or the encryption keys may be on the
hard drive. Thus, the thief gains access to the key and can decode messages.
27. Discuss how EDI creates an environment in which sensitive information, such as
inventory amounts and price data, is no longer private. What potential dangers
exist if the proper controls are not in place? Give an example.
Response: In an EDI environment, the selling firm opens up previously considered
private files, such as inventory and in some cases the master production schedule, to the
customer’s order system so that the inventory status can be checked. If the proper
controls are not in place, a perpetrator could alter these records so that inventory is shown
to be lower than it actually is, and the organization could lose orders as the customer
contacts another vendor. If this situation went undetected for a length of time, the
organization could have such a decline in sales and loss in customer base that it could be
forced out of business.
32. What is a certification authority, and what are the implications for the accounting
profession?
Response: A certification authority is an independent and trusted third party empowered
with responsibility to vouch for the identity of organizations and individuals engaging in
Internet commerce. The question then becomes, who vouches for the CA? How does
one know that the CA who awarded a seal of authenticity to an individual is itself
reputable and was meticulous in establishing his or her identity? These questions hold
specific implication for the accounting profession. Since they enjoy a high degree of
public confidence, public accounting firms are natural candidates for certification
authorities.
33. Discuss the key aspects of the following five seal-granting organizations: BBB,
TRUSTe, Veri-Sign, Inc., ICSA, and AICPA/CICA WebTrust.
Response:
Better Business Bureau. The Better Business Bureau (BBB) is a non-profit organization
that has been promoting ethical business practices through self-regulation since 1912.
BBB has extended its mission to the Internet through a wholly owned subsidiary called
BBBOnline, Inc. To qualify for the BBBOnline seal an organization must:
● Become a member of BBB.
● Provide information about the company’s ownership, management, address, and
phone number. This is verified by a physical visit to the company’s premises.
● Be in business for at least one year.
● Promptly respond to customer complaints.
● Agree to binding arbitration for unresolved disputes with customers.
The assurance provided by BBBOnline relates primarily to concerns about business
policies, ethical advertising, and consumer privacy. BBBOnline does not verify controls
over transaction-processing integrity and data-security issues.
TRUSTe. Founded in 1996, TRUSTe is a non-profit organization dedicated to improving
consumer privacy practices among Internet businesses and Web sites. To qualify to
display the TRUSTe seal the organization must:
● Agree to follow TRUSTe privacy policies and disclosure standards.
● Post a privacy statement on the Web site disclosing the type of information being
collected, the purpose for collecting information, and with whom it is shared.
● Promptly respond to customer complaints.
● Agree to site-compliance reviews by TRUSTe or an independent third party.
TRUSTe addresses consumer privacy concerns exclusively and provides a mechanism for
posting consumer complaints against its members. If a member-organization is found to
be out of compliance with TRUSTe standards, its right to display the trust seal may be
revoked.
Veri-Sign, Inc. Veri-Sign, Inc. was established as a for-profit organization in 1995.
Veri-Sign, Inc. provides assurance regarding the security of transmitted data. The
organization does not verify security of stored data or address concerns related to
business policies, business processes, or privacy. Its mission is to “provide digital
certificate solutions that enable trusted commerce and communications.” Its products
allow customers to transmit encrypted data and verify the source and destination of
transmissions. Veri-Sign, Inc. issues three classes of certificates to individuals,
businesses, and organizations. To qualify for class-three certification the individual,
business, or organization must provide a third-party confirmation of name, address,
telephone number, and Web site domain name.
ICSA. The International Computer Security Association (ICSA) established its Web
Certification Program in 1996. ICSA certification addresses data security and privacy
concerns. It does not deal with concerns about business policy and business processes.
Organizations that qualify to display the ICSA seal have undergone an extensive review
of firewall security from outside hackers. Organizations must be recertified on an annual
basis and undergo at least two surprise checks each year.
AICPA/CICA WebTrust. The AICPA and CICA established the WebTrust program in
1997. To display the AICPA/CICA WebTrust seal the organization must undergo an
examination according to the AICPA’s Standards for Attestation Engagements, No. 1, by
a specially Web-certified CPA or CA. The examination focuses on the areas of business
practices (policies), transaction integrity (business process), and information protection
(data security). The seal must be renewed every 90 days.
34. Differentiate between a LAN and a WAN. Do you have either or both at your
university or college?
Response: The primary difference between LANs and WANs is the geographic area
coverage. LANs are typically confined to a single room, floor, or building. WANs are
used to connect various LANs and computing centers that are geographically dispersed
across distances that range from less than a mile to transcontinental.
MULTIPLE-CHOICE QUESTIONS
1. b
2. a
3. e
4. d
5. e
6. c
7. b
8. e
9. a
10. c
PROBLEMS
1. Network Access Control
Ajax Automotive services retail automotive centers the east coast by supplying them with
quality car and truck parts such as brake pads, oil filters, water pumps, etc. The
company’s 123 sales representatives work exclusively in the field visiting client company
locations and submitting sales orders from laptop computers via an internet connection to
the corporate offices in Delaware. All of Ajax’s sales orders are received in this manner.
Customer account, sales history, inventory, and cash receipts records are stored on a
central server at the corporate site. Customers are billed digitally from the corporate
office on a net 30 basis.
Required;
Outline the access controls that would be appropriate for this situation. Explain why these
controls are necessary.
Response:
Data encryption techniques should be in place for the transmitting sales order and other
sensitive sales data from customer locations to the corporate computer center. Since the
organization has many sales representatives, a public key encryption approach would
work best.
To preserve the integrity of sales orders a digital signature control may be used. Any
tampering with, or alterations to, the original sales order would be detected as a
discrepancy in the digest.
Confidential data stored at the corporate offices, particularly customer data, should also
be encrypted to protect against intrusion attempts.
A onetime password system would increase security by preventing a hacker from
capturing the password and accessing the system
Since the Ajax organization processes all is sales transactions via remote access, it is
vulnerable to denial of sales attacks. These risks are reduced through firewalls, intrusion
prevention software, and deep packet inspection of data entering the system.
Virus Protection software should be installed on the lap tops of sales representatives.
Policies should be in place to ensure that the software is kept current.
Various other network control devises would preserve the integrity of transmitted data.
These include: message sequence numbering, message transaction log, request-response
techniques, and a call-back device.
fraud.
Weakness: Security Over Confidential Material. John was able to learn about the
system’s key operational features, controls, and control trigger points by browsing
information located in employee offices.
● Control: Confidential information should be secured in safes or other appropriate
storage facilities.
● A security policy should be implemented to ensure that all employees recognize
potential security threats and comply with the security policy in place for
confidential material.
Weakness: Lack of Security Software. John was able to successfully install a Trojan Horse
virus that went undetected.
b. For each problem identified, describe a control procedure that could be employed to
Required: For each scenario, discuss the possible damages that can occur. Suggest a
preventive control.
Responses:
a. The intruder can then withdraw money from the ATM cardholder accounts.
(This actually happened in California; the intruder was a systems consultant
who had helped to set up the communication system.) Digital encoding of
data with the algorithm being changed periodically, especially after the
systems consultants have completed their jobs, and the system is in use.
b. Noise on the line may be causing line errors, which can result in data loss.
Echo checks and parity checks can help to detect and correct such errors.
c. If data is being lost, echo checks and parity checks should also help; however,
the problem may be that an intruder is intercepting messages and tampering
with them. Message sequence numbering will help to determine if messages
are being lost, and if they are perhaps a request-response technique should be
implemented that makes it difficult for intruders to circumvent.
d. If messages are being delayed, an important customer order or other
information could be missed. As in item c, message sequence numbering and
request-response techniques should be used.
e. Messages altered by intruders can have a very negative impact on
customer-supplier relations if orders are being altered. In this case, data
encryption is necessary to prevent the intruder from reading and modifying
the data. Also, a digital signature will reveal if the message has been altered.
Required: For each scenario, discuss the potential consequences and give a prevention
technique.
Responses:
A. Network access privileges allow for proper segregation of duties in a shared data
environment. The current method of assigning access privileges (according to
functional affiliation) allows individuals to access data beyond their need to know.
An individual who is granted access to data that are not related to his or her specific
task may be in a position to perpetrate a fraud or cover up serious errors. The
network administrator should, therefore, assign privileges in a manner that separates
incompatible functions and is consistent with job descriptions.
B. Employees with access to critical systems, data, or key processes who have been
terminated should also have their access privileges terminated immediately and should
not be allowed to continue working for the company. This policy should be followed
even for employees who leave on good terms and of their own volition. They should
receive their contractual severance pay, but not remain on the company’s premises.
C. Personal laptop computers are a common source of network viruses, which can be
destructive to corporate databases and applications. Because they are portable, laptops
are subject virus infections from outside of the secure corporate environment.
Antivirus software should be in place on the network server to prevent any files from
being uploaded before they are checked for viruses. Also, an antiviral program should
routinely scan the network server for viruses. Many organizations have policies and
controls in place to prevent personal computers from connecting to corporate
networks.
8. Encryption
The coded message that follows is an encrypted message from Brutus to the
Roman Senate. It was produced using the Caesar cipher method, in which each
letter is shifted by a fixed number of places (determined by the key value).
OHWV GR MXOLXV RQ PRQGDB PDUFK 48 GUHVV: WRJD FDVXDO
(EBRG)
Required:
Determine the key used to produce the coded message and decode it.
9. Encryption
a. Develop a Caesar cipher-type encryption algorithm with a little more
complexity in it. For example, the algorithm could alternatively shift the
cleartext letters positive and negative by the amount of the key value.
Variations on this are limitless.
f. Select a single-digit key.
g. Code a short message using the algorithm and key.
h. Give your instructor the algorithm, key, clear text, and cipher text.
Optional: Your instructor will randomly redistribute to the class the cipher text
messages completed in part d. You are to decode the message you receive as an
`additional assignment
Response: Answers will vary among the class. This is a fun assignment that results in
interesting coding schemes.