Final Assessment ANS Script
Final Assessment ANS Script
Program:_______BBA(H)__________
Faculty Signature
Q1)(a)
Stephanie is ex accountant employee of a firm and she knew about how to deal with accounting
related things, after working as a cleaner; she leaked all the information of employees and use
all data for her personal gains and then she used all data she collected then overstated the
inventory and earned up to $125K monthly, when someone from her company ordered that
they need to keep eye on her suspicious activities, but she clear the data by using virus etc. So,
if company is having a strong department like internal audit control and security check on
systems and efficient operating system that convey idea that if someone attack on it so might
the cleaver company might save from this fraudulent activity.
Q1)(b)
Specific or control techniques need to adopt in order to maintain the privacy of employees,
they should maintain a strong security system to have better safety of data, and for employees
they should come up with innovative idea that face screening of employee or thumb impression
for the security and should have strong internal audit team so the next time they don’t face any
this type of activity, and last they don’t need to dispose off their documents in dumpster they
need to burned then or something else because of this their confidential information is leaked.
Q2 (a)
Robert’s company must have antivirus in their systems and we know they are using mainframes
so need more data safety and protection and when virus attacked might be their system almost
Facing some serious difficulties and may leads towards the loss of data so they need to have
more control over their system company should keep system updated why they allowed
employees to install software in company system because it’s their responsibility not
employee’s, and company should not give much access to employees to install software.
Q2 (b)
When the former employee left the company, so the company should take responsibility of
taking his credentials back and why the company gives full rights to him/her, even afterwards if
she stole any strategy of a company or any kind of information he can leak if someone do
undue influence on her, the company might out of the competition and company should taken
back all the credentials and before leaving their former employees and should have better
operating system and team to fight over situation if the things get out of hand in future and
make sure the relevant data and information will not be use in any suspicious activity which
might cost them later.
Q3)
A 1 N 14
B 2 O 15
C 3 P 16
D 4 Q 17
E 5 R 18
F 6 S 19
G 7 T 20
H 8 U 21
I 9 V 22
J 10 W 23
K 11 X 24
L 12 Y 25
M 13 Z 26
e w t m v i
5 23 20 13 22 9
1 19 16 9 18 5
a s p i r e
x s
24 19
20 15
t o
m r w t m
13 18 23 20 13
9 14 19 16 9
i n s p i
Caesar Cipher method is old type of method for encryption because we use A=1,B= 2, then after
encrypted data we have to add 4 so the value will become coded, in the above question we are
provided with the data we have to decode 1 st we have to convert alphabets into numbers we
will subtract key then we get the desired output as shown above.
Q4) LAN:
LAN stands for local area network, which is used in the local premises of a school, business
and offices. Because the computer connected together in the same building, LAN computers
exchange their data and messages or information in a faster way and it saves time.
WAN:
WAN is wide area network, which is used in wide areas like cross regional, broad area and like
covering the boundaries of metropolitan state or etc. advantages are high bandwidth cover the
global organization need, but it has more security issues than LAN.
Our University uses LAN or we can say Campus area network as well, our university uses only
these two, because there is no need of WAN in universities or campuses.