Employees requiring computer access will be given a user name and password that will be entered when logging on to their computer terminal. A dialog box will appear when the system is turned on and this information will be entered. Correct entry of information will give the user access; if information is entered incorrectly, the user will not be granted access. Furthermore, if a computer terminal is left idle for more than 5 minutes, a password will be required to change their passwords once every year.
Hardware will be purchased from Bell Computer Company with the advice of in – house systems developers. With the exception of basic applications, user departments will purchase computer software, which will be added to the system.
BBCIS will run off of a computing center located in the company’s administration building adjacent to the factory. Access to the computing center will require formal authorization. When entering the room, there will be two security guards. Authorized employees will need to swipe their ID cards to pass though security. Times will be recorded when employees swipe their cards for entrance and exit. The actual room that houses the computer systems will have an advanced air – conditioning and air filtration system to eliminate dust and pollens. There will also be a sprinkler system to minimize damages in case of a fire.
Required :
Based on BBC’s plans for the implementation of a new computer system, describe the potential risks and needed controls. Classify these according to the relevant areas of the COSO framework.
10. Encryption
a. Develop a Caesar cipher – type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the clear text letters positive and negative by the amount of the key value. Variations on this are limitless.
b. Select a single – digit key.
c. Code a short message using the algorithm and key.
d. Give you instructor the algorithm, key, clear text, and cipher text.
e. Optional : Your instructor will randomly redistribute to the class the cipher text messages completed in part d above, You are to decode the message you receive as an additional assignment.
11. Certification Authority Licensing
Research the current state of certification authority licensing in the United States and Europe. Write a brief report of your findings.
12. Types of Destructive Programs
Required :
Write a report outlining the key features of the following types of destructive programs : virus, worm, logic bomb back door, and Trojan horse.
13. Controlling Risk from Destructive Programs
Required :
Write an essay discussing the common technology controls and administrative procedures used to reduce threats from destructive programs.
14. Audit Trail Objectives
Required :
Write an essay outlining the following audit trail objectives : (a) detecting unauthorized access to the system, (b) facilitating the reconstruction of events, and (c) promoting personal accountability.