1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
14

A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor

ds company in Brazil learned of this attack and has built controls into its systems to prevent hackers from accessing its systems. This is an IT application of the COSO principle of _______ and evidences _______ controls.
Computers and Technology
1 answer:
Flura [38]3 years ago
8 0

Answer:

1. Control Activities

2. Internal

Explanation:

Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.

In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.

This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.

You might be interested in
Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer
finlep [7]

Answer:

perdonnosee

Explanation:

8 0
3 years ago
True/False - According to CP-14 Sale of Modular Homes, a licensee who sells land and a modular home to be affixed to the land, t
Natasha_Volkova [10]

Answer:

True - According to CP- Sale of Modular Homes , a licensee who sells land and a modular home to be affixed to the land is subject to the laws and rules of the Commission,

Explanation:

CP-14 Scale of Modular Homes is a Commission that offers service by Licensees. Such Services such as a collection of rents ,development services,management of real property performed independently but not involving renting. These services are integrated with the real state. All money received in connection disbursed according to the law and the rules of Real Estate.

The Commission is a position is Real State, which stated that licensee who sells land modular homes to be affixed to the land to the purchaser in arranged and pre-arranged packaged transaction is subject to the laws and rules of Commission. All money received should be processed through a broker. It is another position of the Commission that of licensee sells a land, a modular home, and there has no brokerage relationship between owners of the land and licensee, then such sale will not comply with requirements of Commission Rule.

5 0
2 years ago
Do you think privacy policies are effective in social networking sites?
Kamila [148]

Answer:

When that information gets posted online, it is no longer private, and may end up falling into wrong hands. Even if you have put in place the highest possible security measures, some of your friends, colleagues and companies you interact with on social media, can end up leaking your personal information.

4 0
3 years ago
Which of the following is not the name of an air mass?
Rus_ich [418]
<span>All the terms are adjectives, not names of air masses. But among the adjectives, tepid seems to be the odd one out.</span>
5 0
3 years ago
Please I need this answer now.<br>this is the fill in the blanks​
Nastasia [14]
Mother board

Because that’s where all the processing takes place
8 0
2 years ago
Other questions:
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • Forms are used to a provide a more user-friendly way to work with data in tables
    14·1 answer
  • [Submit on zyLabs] Please write a function with one input, a matrix, and one output, a matrix of the same size. The output matri
    10·1 answer
  • Specifically describe the design process for an Android phone application.
    12·1 answer
  • Please explain why an operating system makes a great attack target.​
    9·1 answer
  • Your company has a wireless network for its small office network. The wireless network does not broadcast its service set identi
    11·1 answer
  • What are the reasonsfor documenting business rules​
    6·1 answer
  • To use   ( 2 complement ) answer it (101101)2 – (1100)2 =   (                    )2
    12·1 answer
  • Calculate how many different pixel colours could be formed if one of the bytes gives the intensity of the red colour, one of the
    15·1 answer
  • write a function named get majority last name that accepts as its parameter a dictionary from strings to strings the keys of the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!