I believe it’s c sorry if I’m incorrect though
Answer:
1. Control Activities
2. Internal
Explanation:
Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.
In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.
This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.
A Network Intrusion Detection System watches for potentially malicious traffic and triggers Alert when it detects an attack.
<h3>What is Network Intrusion Detection System?</h3>
Network Intrusion Detection System can be regarded as the security system that helps in detection of potentially malicious traffic and gives notification.
Therefore, Network Intrusion Detection System helps to triggers Alert when it detects an attack.
Learn more about Network Intrusion Detection System at:
brainly.com/question/8118353
Answer:
design
Explanation:
Based on the information provided within the question it can be said that these are called design reviews. This is one of the most important parts of the development of a system. This focuses more on answering how something is going to be done in the system as opposed to answering what is going to be done for the system depending on the questions asked in the analysis phase.