Wednesday, 25 January 2017

Complete Solutions for Accounting Information System 12e by Marshall B. Romney Paul J. Steinbart

Complete Solutions for Accounting Information System 12e by Marshall B. Romney Paul J. Steinbart

IF You Want To Purchase A+ Work Then Click The Link Below  , Instant Download




If You Face Any Problem E- Mail Us At  whisperhills@gmail.com


CHAPTER 9

INFORMATION SYSTEMS CONTROLS FOR SYSTEMS RELIABILITY – Part 2: Confidentiality and Privacy
9.1          From the viewpoint of the customer, what are the advantages and disadvantages to the opt-in versus the opt-out approaches to collecting personal information? From the viewpoint of the organization desiring to collect such information?
9.2          What risks, if any, does offshore outsourcing of various information systems functions pose to satisfying the principles of confidentiality and privacy?
9.3          Should organizations permit personal use of e-mail systems by employees during working hours?
               
9.4          What privacy concerns might arise from the use of biometric authentication techniques? What about the embedding of RFID tags in products such as clothing? What other technologies might create privacy concerns?
9.5          What do you think an organization’s duty or responsibility should be to protect the privacy of its customers’ personal information? Why?
9.6          Assume you have interviewed for a job online and now receive an offer of employment. The job requires you to move across the country. The company sends you a digital signature along with the contract. How does this provide you with enough assurance to trust the offer so that you are willing to make the move?
9.1       Match the terms with their definitions:
Virtual Private Network (VPN)
a. A hash encrypted with the creator’s private key
Data Loss Prevention (DLP)
b. A company that issues pairs of public and private keys and verifies the identity of the owner of those keys.
Digital signature
c. A secret mark used to identify proprietary information.
Digital certificate
d. An encrypted tunnel used to transmit information securely across the Internet.
Data masking
e. Replacing real data with fake data.
Symmetric encryption
f. Unauthorized use of facts about another person to commit fraud or other crimes.
Spam
g. The process of turning ciphertext into plaintext.
Plaintext
h. Unwanted e-mail.
Hashing
i. A document or file that can be read by anyone who accesses it.
Ciphertext
j. Used to store an entity’s public key, often found on web sites.
Information rights management (IRM)
k. A procedure to filter outgoing traffic to prevent confidential information from leaving.
Certificate authority
l. A process that transforms a document or file into a fixed length string of data.
Non-repudiation
m. A document or file that must be decrypted to be read.
Digital watermark
n. A copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable.
Asymmetric encryption
o. An encryption process that uses a pair of matched keys, one public and the other private. Either key can encrypt something, but only the other key in that pair can decrypt it.
Key escrow
p. An encryption process that uses the same key to both encrypt and decrypt.

q. The inability to unilaterally deny having created a document or file or having agreed to perform a transaction.

r. Software that limits what actions (read, copy, print, etc.) that users granted access to a file or document can perform.


9.2       Cost-effective controls to provide confidentiality require valuing the information that is to be protected. This involves classifying information into discrete categories. Propose a minimal classification scheme that could be used by any business, and provide examples of the type of information that would fall into each of those categories.

9.3       Download a hash calculator that can create hashes for both files and text input. Use it to create SHA-256 (or any other hash algorithm your instructor assigns) hashes for the following:

a. A document that contains this text: “Congratulations! You earned an A+”
b. A document that contains this text: “Congratulations! You earned an A-”
c. A document that contains this text: “Congratulations! You earned an a-”
d. A document that contains this text: “Congratulations!  You earned an A+” (this message contains two spaces between the exclamation point and the capital letter Y).
e. Make a copy of the document used in step a, and calculate its hash value.
f. Hash any multiple-page text file on your computer.

9.4       Accountants often need to print financial statements with the words “CONFIDENTIAL” or “DRAFT” appearing in light type in the background.

a. Create a watermark with the word “CONFIDENTIAL” in a Word document. Print out a document that displays that watermark.
                       
b. Create the same watermark in Excel and print out a spreadsheet page that displays that watermark.

   c. Can you make your watermark “invisible” so that it can be used to detect whether a document containing sensitive information has been copied to an unauthorized location? How? How could you use that “invisible” watermark to detect violation of copying policy?
9.5       Create a spreadsheet to compare current monthly mortgage payments versus the new monthly payments if the loan were refinanced, as shown (you will need to enter formulas into the two cells with solid borders like a box: D9 and D14)
1.       a.      Restrict access to the spreadsheet by encrypting it.
Further protect the spreadsheet by limiting users to only being able to select and enter data in the six cells without borders.
9.6      Research the information rights management software that may be available for your computer. What are its capabilities for limiting access rights? Write a report of your findings.

Optional: If you can download and install IRM software, use it to prevent anyone from being able to copy or print your report.
9.7       The principle of confidentiality focuses on protecting an organization’s intellectual property. The flip side of the issue is ensuring that employees respect the intellectual property of other organizations. Research the topic of software piracy and write a report that explains:
a.  What software piracy is.
b.  How organizations attempt to prevent their employees from engaging in software piracy.
c.  How software piracy violations are discovered.
d.  The consequences to both individual employees and to organizations who commit software piracy.
9.8  Practice encryption.
Required:
1.       a.      Use your computer operating system’s built-in encryption capability to encrypt a file.

In Windows, if you are working with an open document, you can encrypt it by choosing that option under the  “Prepare” menu:

 b.  TrueCrypt is one of several free software programs that can be used to encrypt files stored on a USB drive. Download and install a copy of TrueCrypt (or another program recommended by your professor). Use it to encrypt some files on a USB drive. Compare its functionality to that of the built-in encryption functionality provided by your computer’s operating system.
9.9       Research the problem of identity theft and write a report that explains:
a.  Whether the problem of identity theft is increasing or decreasing
b.  What kind of identity theft protection services or insurance products are available. Compare and contrast at least two products.
9.10     Certificate authorities are an important part of a public key infrastructure (PKI). Research at least two certificate authorities and write a report that explains the different types of digital certificates that they offer.
9.11        Obtain a copy of COBIT (available at www.isaca.org) and read the control objectives that relate to encryption (DS5.8 and DS5.11). What are the essential control procedures that organizations should implement when using encryption?
SUGGESTED SOLUTIONS TO THE CASES
Case 9-1     Protecting Privacy of Tax Returns
The department of taxation in your state is developing a new computer system for processing individual and corporate income-tax returns. The new system features direct data input and inquiry capabilities. Identification of taxpayers is provided by using the Social Security number for individuals and federal tax identification number for corporations. The new system should be fully implemented in time for the next tax season.

The new system will serve three primary purposes:
1    Data will either be automatically input directly into the system if the taxpayer files electronically or by a clerk at central headquarters scanning a paper return received in the mail.
2    The returns will be processed using the main computer facilities at central headquarters. Processing will include four steps:
a.   Verifying mathematical accuracy
b.   Auditing the reasonableness of deductions, tax due, and so on, through the use of edit routines, which also include a comparison of current and prior years’ data.
c.   Identifying returns that should be considered for audit by department revenue agents
d.   Issuing refund checks to taxpayers
3    Inquiry services. A taxpayer will be allowed to determine the status of his or her return or get information from the last three years’ returns by calling or visiting one of the department’s regional offices, or by accessing the department’s web site and entering their social security number.

The state commissioner of taxation and the state attorney general are concerned about protecting the privacy of personal information submitted by taxpayers. They want to have potential problems identified before the system is fully developed and implemented so that the proper controls can be incorporated into the new system.

Required
Describe the potential privacy problems that could arise in each of the following three areas of processing, and recommend the corrective action(s) to solve each problem identified:
a.   Data input
b.   Processing of returns
c.   Data inquiry

Case 9-2 Generally Accepted Privacy Principles

Obtain the practitioner’s version of Generally Accepted Privacy Principles from the AICPA’s web site (www.aicpa.org).  You will find it located under professional resources and then information technology. Use it to answer the following questions:

1.       1.  What is the difference between confidentiality and privacy?
2.      2.  How many categories of personal information exist? Why?
3.      3.  In terms of the principle of choice and consent, what does GAPP recommend concerning opt-in versus opt-out?
4.      4.  Can organizations outsource their responsibility for privacy?
5.      5.  What does principle 1 state concerning top management’s and the Board of Directors’ responsibility for privacy?
6.      6.  What does principle 1 state concerning the use of customers’ personal information when testing new applications?
7.      7.  Obtain a copy of your university’s privacy policy statement. Does it satisfy GAPP criterion 2.2.3? Why?
8.     8.  What does GAPP principle 3 say about the use of cookies?
9.      9.  What are some examples of practices that violate management criterion 4.2.2?
10.  10.   What does management criterion 5.2.2 state concerning retention of customers’ personal information? How can organizations satisfy this criterion?
11.   11.   What does management criterion 5.2.3 state concerning the disposal of personal information? How can organizations satisfy this criterion?
12.  12.   What does management criterion 6.2.2 state concerning access? What controls should organizations use to achieve this objective?
13.  13.   According to GAPP principle 7, what should organizations do if they wish to share personal information they collect with a third party?
14.  14.   What does GAPP principle 8 state concerning the use of encryption?
15.   15.   What is the relationship between GAPP principles 9 and 10?


No comments:

Post a Comment