-
Vu Do commented on the post, Week 6 Questions, on the site 8 years ago
Great point Yang, with the security feature the user is protected against outside attacks. So if the user is at home and an attack happens, the attacker would not know the location of the user since the VPN IP address is at a different location of the VPN. So the user is protected and the user can work in privacy since the attacker would not like…[Read more]
-
Vu Do posted a new activity comment 8 years ago
What is OSI model? What’s the main function of each OSI layer?
The Open System Interconnection (OSI) model is a network framework to implement protocols through 7 different layers.
1. Physical – Equipment use to transfer information between systems, examples are wires, Ethernet cords, cards, etc.
2. Date Link – Data is encoded and decoded i…[Read more] -
Vu Do commented on the post, Week 6 Questions, on the site 8 years ago
What are the advantages of VPN?
Virtual private network are beneficial for companies since they have their own private server that outside people cannot access. This negates the risk of people stealing information about the company. The VPN is secure and only employees are able to access the network. Employees are able to use features on the…[Read more] -
Vu Do commented on the post, Week 5 Questions, on the site 8 years ago
Good point Annamarie, knowing your inventory on-site is very important because you do not want to have items that are hot on the market run out of stock. You want to be able to have a delivery out for that item as soon as the last 2 are on the shelf. Having too much is also a problem since it takes up more space in your storage. They must then…[Read more]
-
Vu Do commented on the post, Week 5 Questions, on the site 8 years ago
Great points, I liked the separations of duties for inventory control measures. With that in place for an example of the locked jewelry cases, you can have it so one person knows the code to one vault and another person say the manger knows the code to the second door within the vault. That way, when there is access to the vault, the two that…[Read more]
-
Vu Do commented on the post, Week 5 Questions, on the site 8 years ago
Not bad Yulun, having cameras in place will be a good resource to turn to just in case you need to check the tapes for anything suspicious. With the cameras in place, employees will be more unlikely to commit fraud for fear of getting caught and losing their job over it. Being able to rewind and go back to view past recorded videos is also helpful…[Read more]
-
Vu Do commented on the post, Week 5 Questions, on the site 8 years ago
Good points Dan, agreed the pressure was there for Mr. Cash to commit the fraud. Working on the assembly line and seeing all the parts come through. He could have his chance to build the one of a kind Cadillac and be the only one in town with it. So the pressure to stand out and be different got to him and cloudy his judgment. His desire took over…[Read more]
-
Vu Do posted a new activity comment 8 years ago
1. Using the Fraud Triangle analyze the ‘One Piece at a Time’ video scenario and explain how the environment was favorable to Fraud.
For the video everything was set up for fraud being that he was already working on the assembly line and the opportunity was there. He feel as though he could get away with it which gave him the motive to com…[Read more]
-
Vu Do posted a new activity comment 8 years ago
Agreed Abhay, the operating systems provide access to those who are authorize. If that is compromised then it will be a huge risk since all the important information is stored within the OS. There must be safeguards in place that assign which users can access what system within the OS also. If everyone within the company has assign to all the…[Read more]
-
Vu Do commented on the post, Week 4 & 5 Questions, on the site 8 years ago
Great point Ming, improper care of individual applications in the operating system leaves the system vulnerable to attacks. Risk measurements must be in place to safeguard against this so that the operating system will be intact and safe. Individuals must know what to do in case of any scenario that can unfold. There must be meetings discuss of…[Read more]
-
Vu Do posted a new activity comment 8 years ago
List common control issues associated with operating systems and remediation strategy/plan.
Some of the common attacks are:
• Denial-of-service (DOS) Attacks – Attacks that prevent the use of the operating system by gaining access to the system and flooding the system until it overloads or send invalid data to the system which cause a…[Read more] -
Vu Do commented on the post, Week 4 & 5 Questions, on the site 8 years ago
Why is it so important to protect operating systems?
Operating systems are important since it is the tool we used every day to enter information and get information from the system. It is our way to communicate with the machine and to make it function. The operating system must be clear of viruses or malware so that information on it is…[Read more] -
Vu Do commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 8 years ago
Good example Annamarie, I have to give this Starbucks app a try. I like how you explained how easy it is to make an order, pay for it, and then just pick it up from the counter without having to wait in line. It is so convenient and the fact that you do not have to re-do the payment information is super helpful. It sounds like its secure and user…[Read more]
-
Vu Do commented on the post, Week 4 Questions, on the site 8 years ago
Agreed Fred, the stakeholders needs are the most important and the company must satisfy that need in order to retain and get more customers. If the OTC process is not good and customers do not received their product on time or received the wrong item then they would not want to do future business with the company. Making sure the process is…[Read more]
-
Vu Do commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 8 years ago
Great point Paul, I agree both are equally responsible for the OTC process since one controls the financial side and the other the operation. The Operating officer must ensure that the whole order process flows smoothly and is user friendly for customers. The day to day operations to get the order in, process, packing, and shipped is in their…[Read more]
-
Vu Do posted a new activity comment 8 years ago
2. Which portion of the Order to Cash (OTC) process do they see as the most vulnerable to theft, fraud or
failure of some kind? Explain.I would say the payment process is the most vulnerable to theft, fraud or failure. Thieves can steal customer credit card information and place orders online through them. With that there are no measures in…[Read more]
-
Vu Do posted a new activity comment 8 years ago
1. As customers we experience various company’s order to cash process (OTC) whenever we buy something. Which company do you believe has a ‘great’ OTC process? Why?
I believe Amazon has the best OTC process. I am a frequent user of Amazon and always trust their whole delivery process. First off, when looking for an item I need, I would just…[Read more]
-
Vu Do commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years, 1 month ago
Yes Fangzhou, DBMS storing these data is a huge risk if someone were to hack into the system. There must be many security measures in place to prevent this from happening. But hackers are using so many tools these days to get around the security to get into the system to steal these information. So the company must also develop a plan for the…[Read more]
-
Vu Do commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years, 1 month ago
Great definition Jaspreet, I liked how you compared relational database management systems to manual ones saying how it is more flexible, compact and faster. All very true and that is why companies would rather use relational databases on their system so that it is easier to run programs and make changes. It is easier to search and find…[Read more]
-
Vu Do commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Great list Sean, agreed with all your points, these are huge risks towards the database management system. I remember when working as an Associate application developer I would have to get access granted for every database in order to view and work in them. Without that then it would be a huge risk since anyone can access these databases and…[Read more]
- Load More