Briefly describe tests that can be used to detect unauthorized program modifications

What will be an ideal response?

Answer: Review procedures for requesting, approving, programming, and testing changes. Review or observe specific testing and implementation procedures. Compare source code from the approved and tested program with the program code currently in use. Randomly and without notice, use the source code from the approved and tested program to reprocess transactions, and compare the results with the operational system results. Write new code designed to replicate the approved and tested code and use parallel simulation to reprocess transactions, and compare the results with the operational system results.

Business

You might also like to view...

The principal advantage of the completed-contract method is that reported revenue reflects final results rather than estimates.

a. true b. false

Business

Money management refers to annual financial activities necessary to manage personal economic resources.

a. true b. false

Business