Bsac 117 Computer Audit
Bsac 117 Computer Audit
Bsac 117 Computer Audit
ANSWER SHEET
PRELIM QUIZ 1
QUESTIONS ANSWERS
1. What are internal controls? Internal control is a process resulted by plan management and
Explain briefly the importance of employees, and those charged with governance, and designed to
internal controls in safeguarding IT provide reasonable assurance regarding the achievement of
assets and records objectives in the reliability of financial reporting. Effective internal
control reduces the risk of asset loss, and helps ensure that plan
information is complete and accurate, financial statements are
reliable, and the plan’s operations are conducted in accordance
with the provisions of applicable laws and regulations.
2. Differentiate preventive controls A detective control is a type of internal control that seeks to
from detective controls uncover problems in a company's processes once they have
occurred while Preventive controls stand in contrast to detective
controls, as they are controls enacted to prevent any errors from
occurring
3. Give at least three (3) 1. Control environment - This is the attitude of management and
components of internal controls their employees regarding the need for internal controls.
and describe each briefly
2. Monitoring - This is the set of processes used by management to
examine and assess whether its internal controls are functioning
properly.
5. Define computer ethics Computer ethics are a set of moral standards that govern the use
of computers. It is society’s views about the use of computers,
both hardware and software.
6. When is an act fraudulent? An act is fraudulent when there is intentional deception to secure
(Hint: You may give the conditions unfair or unlawful gain, or to deprive a victim of a legal right.
of fraud.) (3 points)
7. Give at least three (3) examples 1. Viruses - computer code that can copy itself and spread from
of risks or threats to a company’s one computer to another, often disrupting computer operations
IT resources. Explain each briefly.
2. spam, scams and phishing - unsolicited email that seeks to fool
(6 points)
people into revealing personal details or buying fraudulent goods
PRELIM QUIZ 2
COMPUTER
FRAUD DESCRIPTION
6 Logic Bombs Logic bomb is a sinister piece of code that is secretly inserted into a computer
network, operating system, or a software application. Like any other malicious
code, its primary goal is to wreak havoc on your system like steal or corrupt your
data, crash or overtake your device, or completely wipe your hard drive.
7 Trojan Horse Trojan horse or Trojan is a type of malware that is often disguised as legitimate
software. Trojans can be employed by cyber-thieves and hackers trying to gain
access to users' systems.
8 Phishing Scam Phishing is a type of social engineering attack often used to steal user data,
including login credentials and credit card numbers. It occurs when an attacker,
masquerading as a trusted entity, dupes a victim into opening an email, instant
message, or text message.
9 Web Jacking Web jacking derives its name from “hijacking”. Here, the hacker takes control of
a web site fraudulently. He may change the content of the original site or even
redirect the user to another fake similar looking page controlled by him.
10 Cyber stalking Cyberstalking is stalking that takes place using electronic devices or the internet.
It is the technological harassment directed towards a specific individual.