1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
14

A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor

ds company in Brazil learned of this attack and has built controls into its systems to prevent hackers from accessing its systems. This is an IT application of the COSO principle of _______ and evidences _______ controls.
Computers and Technology
1 answer:
Flura [38]3 years ago
8 0

Answer:

1. Control Activities

2. Internal

Explanation:

Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.

In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.

This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.

You might be interested in
What Internet access method would be suitable for a business requiring a high bandwidth connection where no cabled options exist
34kurt

Answer:

Fiber Optic, it allows for speeds up to 1200 mbps

Explanation:

4 0
3 years ago
A method of using a square grid of imaginary lines to describe part features is known as _____.
Fiesta28 [93]

Answer:

The answer is "Prime Meridian".

Explanation:

The process, that describes an imaginary line in part these features is known as Prime Meridian. It is also known as 0° Longitude in which Longitude is a statistical vector that determines the location to East to West and points on the surface of the Earth or of a paradisaical body surface, and 0° Longitude is the line that describes the Equator and divides the world into two equal quadrants.

4 0
3 years ago
Select the pseudo-code that corresponds to the following assembly code. Assume that the variables a, b, c, and d are initialized
Nadusha1986 [10]

Answer:

ae

Explanation:

4 0
3 years ago
Please I need help with this. How do I get rid of it. It blocks me from seeing questions or answering them.
anyanavicka [17]

Just try clicking the why am I seeing this and you might find yoir way out

Sorry there is nothing I can do since I've not seen it before

6 0
2 years ago
What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? answer
drek231 [11]
Telnet or rsh and ssh, http and https, ftp and sftp or ftps ? How are you accessing the server?
8 0
3 years ago
Other questions:
  • A company database consists of 10,000 sorted names, 40% of whom are known as good customers and who together account for 60% of
    13·1 answer
  • What keyboard shortcut keys selects cell A1
    12·1 answer
  • A variable used as a subscript should be initialized to ________.
    12·1 answer
  • In a certain computation, 90% of the work is vectorizable. Of the remaining 10%, half is parallelizable for an MIMD machine. Wha
    9·1 answer
  • Sonja is writing a program to compare two numbers and print the larger number. Which of these should be used?
    6·1 answer
  • Use the factorial operation to evaluate 4!.<br><br> 24<br><br> 1<br><br> 4<br><br> 10
    10·1 answer
  • A company is concerned that hackers may gain access to its computer system or that it may be
    11·1 answer
  • What does the sign (#) mean in manuscript edpm<br> and also what does (DEL)
    15·1 answer
  • Following rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as _______.
    6·1 answer
  • What made the digital distribution of both data and visualization more accessible to a broader audience?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!