Question Tag: System Security

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

AAA – May 2018 – L3 – SB – Q3 – Auditor’s Legal Liability

Evaluate necessary IT general and application controls for a fully computerized hotel to ensure data integrity and security.

A new hotel opened for operations on February 1, 2016, in Abuja. The directors at their board meeting in September 2016 selected December as the hotel’s year-end. Also, from the conception of the hotel, it was decided to fully computerize the hotel and its operations. This will make the hotel stand out and attract clientele in the federal capital territory where there are many other hotels with strong competition.

The room doors are electronically operated and use electronic cards for opening. If a customer does not specify his/her duration and has the lock properly programmed, the door will lock at 12 noon, requiring the customer to go back to the reception for access. Furthermore, all accounting and other processes are computerized.

The IT company that handled the computerization agreed to leave a member of staff who will train the hotel’s staff for three months and ensure that the system operates efficiently. Management believes that the staff will familiarize themselves with the system within that period. The server handles all doors, accounting processes including billing, and the determination of room occupancy rate on a daily basis. Various units of the hotel have desktop units which key employees use in both ordering and communication between themselves. The server is located next to the operations manager’s office, who is responsible for overseeing it in addition to other duties.

The last quarterly report on the hotel activities was not consistent with expectations, and the occupancy rate did not match turnover. The management of the hotel approached your firm of chartered accountants to be engaged as auditors to the hotel. Your review and interactions as the leader of the audit team revealed the information disclosed above.

Required:

Evaluate and apply the relevant general and application controls necessary to be installed in the hotel’s information environment.
(Total 20 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AAA – May 2018 – L3 – SB – Q3 – Auditor’s Legal Liability"

MI – Nov 2014 – L1 – SA – Q14 – Information Systems Development and Security

This question tests knowledge on system vulnerability, specifically referring to risks and threats.

The exposure of a system to likely risks and threats is called:
A. Virus attack
B. Worms attack
C. Vulnerability
D. Weakness
E. Data Didling

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2014 – L1 – SA – Q14 – Information Systems Development and Security"

MI – May 2016 – L1 – SA – Q20 – Information System Development and Security

Identify non-standard risk management measure.

The following are measures for the management of risks EXCEPT

A. Identifying risks to system security
B. Evaluating and prioritising the identified risks
C. Developing controls to avoid the identified risks or control the risk within acceptable limits
D. Implementing the controls and monitoring their effectiveness
E. Allowing the risks to manifest and monitor control

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SA – Q20 – Information System Development and Security"

MI – May 2024 – L1 – SB – Q4a – Information Systems

Differentiate between system security and system control.

a. State clearly the distinction between system security and system control. (2 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2024 – L1 – SB – Q4a – Information Systems"

BMIS – May 2017 – L1 – Q4b – The internet, cloud computing, IS security and blockchain

Identify key risks threatening system security and data integrity and outline methods to minimize these risks.

Computer systems are exposed to security risks that threaten the security and integrity of both the system and data held in it. These threats are becoming increasingly sophisticated and seem to multiply by the day, resulting in endless headaches for IT professionals.

With each new piece of technology arriving on the scene, a security threat seems to accompany it. The key for IT is to constantly evaluate current security measures and policies to identify any shortcomings that may be exposing the company to risk.

Required: Explain THREE main risks that threaten security and integrity of systems and data held in them and TWO ways to minimize such risks. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2017 – L1 – Q4b – The internet, cloud computing, IS security and blockchain"

AAA – May 2018 – L3 – SB – Q3 – Auditor’s Legal Liability

Evaluate necessary IT general and application controls for a fully computerized hotel to ensure data integrity and security.

A new hotel opened for operations on February 1, 2016, in Abuja. The directors at their board meeting in September 2016 selected December as the hotel’s year-end. Also, from the conception of the hotel, it was decided to fully computerize the hotel and its operations. This will make the hotel stand out and attract clientele in the federal capital territory where there are many other hotels with strong competition.

The room doors are electronically operated and use electronic cards for opening. If a customer does not specify his/her duration and has the lock properly programmed, the door will lock at 12 noon, requiring the customer to go back to the reception for access. Furthermore, all accounting and other processes are computerized.

The IT company that handled the computerization agreed to leave a member of staff who will train the hotel’s staff for three months and ensure that the system operates efficiently. Management believes that the staff will familiarize themselves with the system within that period. The server handles all doors, accounting processes including billing, and the determination of room occupancy rate on a daily basis. Various units of the hotel have desktop units which key employees use in both ordering and communication between themselves. The server is located next to the operations manager’s office, who is responsible for overseeing it in addition to other duties.

The last quarterly report on the hotel activities was not consistent with expectations, and the occupancy rate did not match turnover. The management of the hotel approached your firm of chartered accountants to be engaged as auditors to the hotel. Your review and interactions as the leader of the audit team revealed the information disclosed above.

Required:

Evaluate and apply the relevant general and application controls necessary to be installed in the hotel’s information environment.
(Total 20 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AAA – May 2018 – L3 – SB – Q3 – Auditor’s Legal Liability"

MI – Nov 2014 – L1 – SA – Q14 – Information Systems Development and Security

This question tests knowledge on system vulnerability, specifically referring to risks and threats.

The exposure of a system to likely risks and threats is called:
A. Virus attack
B. Worms attack
C. Vulnerability
D. Weakness
E. Data Didling

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2014 – L1 – SA – Q14 – Information Systems Development and Security"

MI – May 2016 – L1 – SA – Q20 – Information System Development and Security

Identify non-standard risk management measure.

The following are measures for the management of risks EXCEPT

A. Identifying risks to system security
B. Evaluating and prioritising the identified risks
C. Developing controls to avoid the identified risks or control the risk within acceptable limits
D. Implementing the controls and monitoring their effectiveness
E. Allowing the risks to manifest and monitor control

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2016 – L1 – SA – Q20 – Information System Development and Security"

MI – May 2024 – L1 – SB – Q4a – Information Systems

Differentiate between system security and system control.

a. State clearly the distinction between system security and system control. (2 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – May 2024 – L1 – SB – Q4a – Information Systems"

BMIS – May 2017 – L1 – Q4b – The internet, cloud computing, IS security and blockchain

Identify key risks threatening system security and data integrity and outline methods to minimize these risks.

Computer systems are exposed to security risks that threaten the security and integrity of both the system and data held in it. These threats are becoming increasingly sophisticated and seem to multiply by the day, resulting in endless headaches for IT professionals.

With each new piece of technology arriving on the scene, a security threat seems to accompany it. The key for IT is to constantly evaluate current security measures and policies to identify any shortcomings that may be exposing the company to risk.

Required: Explain THREE main risks that threaten security and integrity of systems and data held in them and TWO ways to minimize such risks. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2017 – L1 – Q4b – The internet, cloud computing, IS security and blockchain"

error: Content is protected !!
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan