978-0134474021 Chapter 9 Solutions Manual Part 2

subject Type Homework Help
subject Pages 9
subject Words 1542
subject Authors Marshall B. Romney, Paul J. Steinbart

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Then uncheck the box next to “Locked” as shown below, because these are going to be the only cells we do not protect in the next
step.
page-pf2
Now, under the Format drop-down menu, select “Protect Sheet” and then
a) enter a password, and
b) uncheck the box “Select locked cells”. This will protect the entire sheet EXCEPT for the cells you unlocked in the previous
page-pf3
Ch. 9: Confidentiality and Privacy Controls
9.6 Visit Symantec.com or any other security software vendor assigned by your
instructor and download a trial version of encryption software.
a. Use the software to encrypt a file.
b. Send the encrypted file to your instructor and to a friend.
c. Try to open an encrypted file you receive from your friend or from your
instructor. Print a screenshot to show what happens.
d. List all the options for importing the key needed to decrypt an encrypted file
you receive from your friend or instructor. Which do you think is most secure?
Easiest? Explain why.
e. Import (or install) the key needed to decrypt an encrypted file you receive from
your friend or instructor. E-mail the decrypted file to whomever sent it to you
and obtain verification that it is the plaintext version of the encrypted file they
sent you.
Solutions will vary depending upon the student’s computer and version of operating
system and the encryption software used. To grade:
a. Require submission of a file.
9-3
©2018 Pearson Education, Inc.
page-pf4
Accounting Information Systems
9.7 The principle of confidentiality focuses on protecting an organization’s intellectual
property. The flip side of the issue is ensuring that employees respect the intellectual
property of other organizations. Research the topic of software piracy and write a
report that explains:
a. What software piracy is.
b. How organizations attempt to prevent their employees from engaging in
software piracy.
c. How software piracy violations are discovered.
d. The consequences to both individual employees and to organizations who
commit software piracy.
Solutions will vary. Key points to look for in the report:
a.Definition of software piracy that clearly indicates it involves the illegal or
b.Training and periodic audits of employees’ computers.
9-4
©2018 Pearson Education, Inc.
page-pf5
Accounting Information Systems
9.8 Practice encryption using both any encryption capabilities provided by your
computer’s operating system and by using third-party encryption software.
Required:
a. Use your computer operating system’s built-in encryption capability to encrypt a
file.
In Word 2016, you can encrypt the document by choosing the option “encrypt
with Password” under the protect Document option, part of the Info section of
the File tab.
9-5
©2018 Pearson Education, Inc.
page-pf6
Accounting Information Systems
9-6
©2018 Pearson Education, Inc.
page-pf7
Accounting Information Systems
Clicking on the Advanced button brings up this dialog box:
Select the box “Encrypt contents to secure data” and follow the directions.
Select the “Manage User Accounts” and then click the “Add” button. You will then be
prompted to give a name to your new user account and decide whether it is a standard
user or an account with administrative rights. For purposes of this exercise, just create
9-7
©2018 Pearson Education, Inc.
Accounting Information Systems
a standard user.
9-8
©2018 Pearson Education, Inc.
page-pf9
Accounting Information Systems
Double-click on Computer Management and then click on the Users and Groups:
9-9
©2018 Pearson Education, Inc.
page-pfa
Accounting Information Systems
9-10
©2018 Pearson Education, Inc.
page-pfb
Accounting Information Systems
Which of the following actions can you perform?
1. Open the file
2. Copy the file to a USB drive.
3. Move the file to a USB drive.
4. Rename the file.
5. Delete the file
ADDITIONAL NOTE TO INSTRUCTORS: Tell students to save the encrypted file in a
shared directory that is accessible to all users who log onto that system. That way, even a
standard user will be able to see the files.
IMPORTANT NOTE TO INSTRUCTORS: Tell students to delete the new user
account that they created to do this problem after they finish the assignment.
b. Download and install a copy of an other encryption software program
recommended by your instructor. Use the software to encrypt some files on a
USB drive and then try to perform the same five actions listed in requirement a.
c. Write a brief report that compares the third-party encryption software’s
functionality to that of the built-in encryption functionality provided by your
computer’s operating system. Which is easier to use? Why? What are the limits
(in terms of performing the five tasks) of each?
9.9 Explore and test various browser privacy settings.
a. Open your favorite browser and print a screenshot of your current settings.
b. Go to www.cisecurity.org and obtain the recommended best practices for privacy
settings for your browser. Change your existing settings to those best practices.
Use your browser to perform these tasks: (1) search for information about
identity theft protection products, (2) open and read your personal e-mail
account, (3) open and read your university or work-related e-mail account, (4)
attempt to purchase something from amazon.com or any other site (you need not
9-11
©2018 Pearson Education, Inc.
page-pfc
Accounting Information Systems
actually make the purchase, just try to at least get to the point in the shopping
cart where you are asked to enter your credit card number, and (5) login to your
favorite social networking site. What was the effect, if any, of changing your
privacy settings?
c. Repeat step b above for another browser. Which browser makes it easier to
configure privacy settings? Are there any differences between the browsers in
terms of using them after you have changed the privacy settings to those
recommended by the cisecurity.org benchmark documents?
9-12
©2018 Pearson Education, Inc.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.