1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
14

A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor

ds company in Brazil learned of this attack and has built controls into its systems to prevent hackers from accessing its systems. This is an IT application of the COSO principle of _______ and evidences _______ controls.
Computers and Technology
1 answer:
Flura [38]3 years ago
8 0

Answer:

1. Control Activities

2. Internal

Explanation:

Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.

In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.

This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.

You might be interested in
These principles are essential to the design and development and production of clothing
damaskus [11]

Answer:

B. Principle of Design

Explanation:

Principle of Design are principles which are essential to the design and development and production of clothing.

Basically, Principle of Design comprises of the sets of rule and standard that essentially provide a framework and guide fashion designers in the creation of fashionable clothing for their clients or customers.

Hence, it is very important for all fashion designers to understand and judiciously use the Principle of Design while working on a piece of clothing.

8 0
2 years ago
In spreadsheet software, use ____ to create meaningful data summaries to analyze worksheets containing large volumes of data.
morpeh [17]
<span>In spreadsheet software, use pivot tables to create meaningful data summaries to analyze worksheets containing large volumes of data.</span>
6 0
3 years ago
What is the meaning of website cookies? brief explanation ​
Dvinal [7]

Answer: Cookies are messages that web servers pass to your web browser when you visit Internet sites

7 0
2 years ago
Read 2 more answers
What is a multi-user computer? a computer that has a printer connected to it a computer that is able to access the internet a co
Varvara68 [4.7K]
<span>a computer that is used by more than one employee

A multi-tasking computer is </span><span>able to run more than one program</span>
8 0
3 years ago
Explain the types of network architecture with their merits and demerits
Tasya [4]

Answer:

First and foremost, what is network architecture? It's basically the physical and logical design which refers to the software, hardware, protocols and the media of transmission of data. Simply put, it refers to how computers are organized and how tasks are allocated among these computers. The two types of widely used network architectures are peer-to-peer aka P2P and client/server aka tiered.

Peer-to-Peer Architecture

In a peer-to-peer network, tasks are allocated to every device on the network. Furthermore, there is no real hierarchy in this network, all computers are considered equal and all have the same abilities to use the resources available on this network. Instead of having a central server which would act as the shared drive, each computer thats connected to this network would act as the server for the files stored on it.

8 0
2 years ago
Other questions:
  • A class car and its subclass bmw each have a method run(), which was written by the developer as part of the class definition. i
    10·1 answer
  • Interest rate risks would be most relevant to what purchase?
    7·2 answers
  • HELP ME PLEASE!!!!!!!!!!!!
    8·2 answers
  • You are configuring IP settings on a new network. For the external interfaces, you decide to obtain registered IP addresses from
    5·1 answer
  • bro this scared me, i thought i just got hacked, could someone explain why when i went to ask a question, it kicked me out my ac
    9·2 answers
  • A popular database software program called ____ offers a wizard and QBE tool to help build and generate SQL queries
    9·1 answer
  • Why do we use a design process?
    13·2 answers
  • Write 'T' for true and 'F' for false statements.
    9·1 answer
  • The cost to ship a package is a flat fee of 75 cents plus 25 cents per pound. 1. Declare a const named CENTS_PER_POUND and initi
    12·1 answer
  • A(n) _______________ is a network organization that centralizes user accounts, passwords, and access to resources.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!