-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
The article I found is about Apple sharing its customers’ personal data with the police when required.
In fact, one may think that doing conversations with friends using IMessage is safe due to the end to end encryption (a system of communication where only the communicating users can read the messages). However, it is not. Apple records a log…[Read more] -
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
VPN is a technology which creates a virtual private network to which end users are connected via an encrypted channel.
Its main advantages are as below:
Ensure security – even if the communication channel is compromised, you cannot be harmed or the harm will be minimal if you are connected to a VPN because the VPN connection is encrypted…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
What is OSI model? What’s the main function of each OSI layer?
Open Systems Interconnection (OS) is reference model for how applications can communicate over a network. It guides vendors and developers so the digital communication products and software programs they create will work together without special effort on the part of the cu…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
oh okay.
yes it does! thank you.
Adopting business B’s method is a better way to prevent inventory fraud obviously.
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
Surprise inventory count is a good one! In fact, employees won’t expect it, which makes it easier to detect fraud. If a fraud is detected once, chances are that it will not happen again because they would be scared to be caught. Similarly, if employees know that there are surprise inventory counts once in a while, the idea of stealing shouldn’t…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
You are absolutely right Paul. Not only Johnny was under pressure to please other with his unique car, but also had the mean to do so, for free.
There was definitely a lack of monitoring in this case, which set the opened the door “easy” crimes.
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 5 Questions, on the site 8 years ago
Sean, I would think that every pieces are store at the same location so segregating portions of the assembly process wouldn’t necessarily prevent inventory fraud. Right?
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
good analysis Sean.
I also think that he had opportunity to commit fraud because not only he was a trusted employee but also he had “connection”. He had friends on site who helped him as well. I don’t think that he could have done this alone.you are also right on the incentive part. I mean he didn’t pay anything, and for him GM wouldn’t even…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
2) Assume the ‘One Piece at a Time’ video scenario could happen. If you are the operations manager responsible for the assembly line, what 1-2 key controls would you implement? Explain how the control addresses the risk.
If I was the operations manager, I would use detective controls to mitigate employees theft and fraud. In order word…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
1. Using the Fraud Triangle analyze the ‘One Piece at a Time’ video scenario and explain how the environment was favorable to Fraud.
This video is actually a song in which the singer (johnny) leaves his home in Kentucky to work in an assembly line at General Motors (GM) in Detroit, MI. The first year he participated in the creation of a Cadill…[Read more]
-
Brou Marie Joelle Alexandra Adje commented on the post, Progress Report for Week Ending, September 29, on the site 8 years ago
oh right. duh! thank you Laly. this add button saved my life lol.
-
Brou Marie Joelle Alexandra Adje commented on the post, Progress Report for Week Ending, September 22, on the site 8 years ago
How do you add the 5 1GB drives to the VM?
-
Brou Marie Joelle Alexandra Adje commented on the post, Progress Report for Week Ending, September 22, on the site 8 years ago
what is the translation of GB in Vmware? ( trying to figure out how to add 5 1gb drives to the VM machine).
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
Laly, as I mentioned to Said computers have the ability to function without and OS. Proof is that the early computers did not have an OS.
The only thing is that it is very hard to use computer without OS because everything need to be done manually. Users need to key in the programs by hand, which is a waste of time. I mean it would take hours to…[Read more] -
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years ago
Security is definitely a big issue in operating system. Windows security is not that great at all. I remember reading an article mentioning that nearly one million malware threats that can affect Windows systems, are released every day. That’s crazy.
A good way to protect the operating system should be to configure it in a way that it would be…[Read more]
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 4 & 5 Questions, on the site 8 years ago
Said, it may seem impossible for a computer to not operate without an operating system, but that is not the case. computer can operate without an operating system, however the user will be put in the position of writing code that must tell the computer exactly what to do. For example if the user want to type up a document in a word processing…[Read more]
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 4 & 5 Questions, on the site 8 years ago
Indeed Ian, the operating system is the key to making informed decisions about one’s computer. I’d say that it is similar to a resource manager and handles decision making and interruption. It manages the time for tasks to occur.
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 4 Questions, on the site 8 years ago
Joshua, Apple Pay may seem to be more secure than using your actual card but that would not stop a hacker who has already hacked your credit card info and actually use it to create an Apple Pay account on their own device. That is an issue. In fact, that exact scenario poses what is probably the biggest fraud risk.
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 4 Questions, on the site 8 years ago
Yulun, I’m not sure I understand your answer well here. If there is a payment authorization step that allow companies to cancel suspicious orders, where is the vulnerability to fraud?
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 4 Questions, on the site 8 years ago
you are right Binu.
For instance, there would be fraud at the first step of OTC if the sales teams offer preferential terms to close a deal whereas the adjusted terms are inappropriate and unauthorised. Similarly, free goods and samples can be inappropriately used resulting in loss of assets. - Load More