Chapter Ten

Computer Fraud and Countermeasures

ANSWERS: FILL IN THE BLANKS

1. Operational management
2. raw data
3. unauthorized transactions
4. application systems, business controls
5. online, real-time
6. operational overhead, computing power
7. information, potential entry points
8. external networks, from anything
9. recognized
10. may or may not
11. unauthorized, training, understanding
12. poorly designed, internal control structures
13. writing programs, additional authorities
14. critical, foundation, penetration
15. Communications, strengthened, weakened, bypassed
16. Encryption
17. Symmetrical key cryptography
18. public key, encrypting, decrypt
19. public key, private key
20. failure
21. algorithm, sizes
22. authorized, genuine
23. originator's private
24. virtualization, software control, paravirtual machine model
25. fraud resistant, isolated
26. restricted data, unauthorized access, compromised
27. unauthorized devices, detective
28. server
29. authentication, administration
30. accuracy, authenticity, existence
31. secure socket layers
32. authenticated, communication protocol
33. enforces
34. written down
35. passed around
36. birth dates, Social Security numbers
37. Social media
38. standard, unique
39. investment newsletter subscription, economic collapse
40. mobile device, supplemented
41. Device identification, location awareness, device fingerprinting, geolocation ...

Get Corporate Fraud and Internal Control Workbook: A Framework for Prevention now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.