logo

Weaknesses and Risks in Bell Studio's System

   

Added on  2023-01-04

15 Pages2406 Words46 Views
 | 
 | 
 | 
Running head: BELL STUDIO
BELL STUDIO
Name of the Student
Name of the University
Author’s Note
Weaknesses and Risks in Bell Studio's System_1

1BELL STUDIO
Table of Contents
Introduction................................................................................................................................3
Weaknesses and connected risks................................................................................................5
Unauthorized access...............................................................................................................5
Spoofing and Sniffing............................................................................................................6
Conclusion..................................................................................................................................8
Weaknesses and Risks in Bell Studio's System_2

2BELL STUDIO
1.0 Introduction
Organization faces security threats all around the clock. This report highlights the
condition of Bell Studio and evaluates the potential risks the company faces and the intrinsic
control for the expenditure cycle. The discussion briefly points out the major internal
weakness in each of the system of the organization and the potential risks associated with it.
The report concluded with the information of various threats that are faced by the company.
The flow chart as well as the data flow diagram of the various departments of the
organization is provided in this report for the analysis of the working of the processes of the
organization.
Weaknesses and Risks in Bell Studio's System_3

3BELL STUDIO
2.0 Discussion
2.0.1 Data flow diagram of payroll system
Weaknesses and Risks in Bell Studio's System_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents