Per Chapter 16 Problem 9 Security and Control Assessment discuss the internal co
ID: 3574841 • Letter: P
Question
Per Chapter 16 Problem 9 Security and Control Assessment discuss the internal control weaknesses and your recommendations to strengthen them as they relate to computer security, systems development and program change.
6. PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a preventive control.
a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM card- holders. (The user subsequently codes this information onto a magnetic coding device and places this strip on a piece of cardboard.)
b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled.
c. Because of occasional noise on a transmission line, data being transferred are lost or garbled.
d. An intruder is temporarily delaying important strategic messages over the telecommunications lines.
e. An intruder is altering electronic messages before the user receives them.
Explanation / Answer
answer a >
Since the intruder had retrieved the identifying codes & personal identification numbers for ATM card. And now he is coding it onto the magnetic tape & placing it on the cardboard. Basically he is trying to clone the ATM card. In your ATM card all the information is on the black or silver magnetic strip which is placed on a plastic card.
The damage that can be caused is that the ATM card can used in an unauthorized way causing financial loss. To prevent this, we need to be careful while using our card on the swipe machines & other devices & also at ATMs. There may be chances of ATM skimming.
============================================
answer 2> Because of occasional noise on a transmission line, electronic messages received are extremely garbled. There is a possible damage because of the garbled message. This can be a act of an intruder or hacker to try to connect to your transmission line. Your important information could be leaked.
To prevent this, always use a secure line & try not to use open transmission lines for confidencial information exchange.
===============================================
answer 3> Because of occasional noise on a transmission line, data being transferred are lost or garbled. The possible damage could be here is the change in the data values or the files being got corrupted. In order to prevent it, you should use secure line. You should definetly use encryption when sharing important imformation online
==============================================
answer 4> An intruder is temporarily delaying important strategic messages over the telecommunications lines. This can be very serious threat, as the intruder might be disrupting the flow of the messages and routing them through different route for his purposes.
There may also be a chance that the intruder is trying to use that information somewhere else or it may be possible that the intruder might be uploading his payload into those messages & when the message will arrive to you, he can use that payload to exploit the system.
In order to prevent it, you need to use a highly complex encryption system & programs which will detect any possible delays in the packets received.
================================================
answer e> An intruder is altering electronic messages before the user receives them. This is almost the same as above. The intruder is altering the messages in order to fit his payload into them for a future possible attack or he might dont want the original messages to recieved to you.
The only way to prevent this is to make use of encryption & hashing. There are lots of big Softwares which uses a complex hash function to calculate the hash of the whole message. this hash value is calculated at the sender's side & when the receiver will get the message, he will again calculate the hash on the message. Now the new hash value should match with the hash value calculated before, which confirms that the message is not altered.
feel free to ask if you have any doubt :)
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.