O'Reilly logo

Corporate Fraud and Internal Control Workbook: A Framework for Prevention by Richard E. Cascarino

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Ten

Computer Fraud and Countermeasures

ANSWERS: FILL IN THE BLANKS

1. Operational management
2. raw data
3. unauthorized transactions
4. application systems, business controls
5. online, real-time
6. operational overhead, computing power
7. information, potential entry points
8. external networks, from anything
9. recognized
10. may or may not
11. unauthorized, training, understanding
12. poorly designed, internal control structures
13. writing programs, additional authorities
14. critical, foundation, penetration
15. Communications, strengthened, weakened, bypassed
16. Encryption
17. Symmetrical key cryptography
18. public key, encrypting, decrypt
19. public key, private key
20. failure
21. algorithm, sizes
22. authorized, genuine
23. originator's private
24. virtualization, software control, paravirtual machine model
25. fraud resistant, isolated
26. restricted data, unauthorized access, compromised
27. unauthorized devices, detective
28. server
29. authentication, administration
30. accuracy, authenticity, existence
31. secure socket layers
32. authenticated, communication protocol
33. enforces
34. written down
35. passed around
36. birth dates, Social Security numbers
37. Social media
38. standard, unique
39. investment newsletter subscription, economic collapse
40. mobile device, supplemented
41. Device identification, location awareness, device fingerprinting, geolocation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required