Question 1. How social engineering could render certain security, privacy and confidentiality controls ineffective. How social engineering could be used to get around specific controls.
Social engineering is a broad term used to describe different types of malicious activities that use psychological manipulation to trick individuals to give out sensitive information such as security details.
Despite the fact that significant organizations have strong security against network criminals, cyber-attackers use human interaction to bypass such security controls by offering tempting information.
Communications may be in the form of emails. These emails contain malware in the form of links that automatically expose organization’s information to their party criminals.
Social engineering, therefore, could be used to bypass security controls in the following ways;
Use of flash drives- Criminals may decide to place flash drives in strategic positions where innocent an unsuspecting fellow will find and proceed to insert into their personal computers. The flash drive contains malware which automatically exposes the computer to outside attacks.
Email from friends- criminals may hack friend emails and later use such emails to send you messages containing links. The links contain malware which automatically takes over your computer control.
Question 2. List all revenue activities in order and explain each.
- Sales order entry
Sales order entry is the activity of inputting information regarding a customer and the products that they have ordered.
- Shipping
Shipping is a revenue activity that entails transportation of a product and in most instances it is through the mail.
- Billing
Billing is a revenue activity that entails the process of sending an invoice to the customers for the goods or services offered.
- Cash collection
It is the activity of recovering cash from a person or even a business that your company has given them an invoice.
Question 3. List all expenditure activities in order and explain each.
- Ordering
It is the first expenditure activity. It is conducted when ordering materials, supplies and even the services done for a company.
- Receiving
The second expenditure activity is receiving. After an order has been place, a business has to receive and keep the goods they have purchased.
- Approving invoices
This is the activity of approving vendor invoices. It occurs after a company has received goods.
- Disbursing cash
This is the last activity and it entails paying cash for invoices from vendors. The activity incorporates marking off of the documents that show how payment has been made.
0
1257