Accounting Information Systems
Accounting Information Systems
11th Edition
ISBN: 9781337552127
Author: Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher: Cengage Learning
Question
Book Icon
Chapter 9, Problem 2SP

1)

Summary Introduction

To determine: Whether anyone can read the message.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

1)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  1

Here,

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether anyone can read the message:

Not everyone can read the message. Only the person who has the private key of Person S can be able to open the message.

2)

Summary Introduction

To determine: Whether Person S can be sure that the message is from Person H.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

2)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  2

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether Person S can be sure that the message is from Person H:

Anyone with the public key of Person S can be able to send the message

3)

Summary Introduction

To determine: Whether digital signature message is secret.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

3)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  3

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether a digital signature message is secret:

Anyone with the public key of Person H can be able to open the digital signature message.

4)

Summary Introduction

To determine: Whether someone other than Person H can send the digital signature message.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

4)

Expert Solution
Check Mark

Answer to Problem 2SP

Hence, the answer is No.

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  4

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine whether someone other than Person H can send the digital signature message:

A person with the private key of Person H can be able to send the digital signature message.

5)

Summary Introduction

To determine: How Person S know that the message has not been corrupted in transit.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

5)

Expert Solution
Check Mark

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  5

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine how Person S know that the message has not been corrupted in transit:

If the hash total of digital signature equals the hash total that Person S calculated from the message then the message has not been corrupted in transit.

6)

Summary Introduction

To determine: The sub-part that is related to authenticity.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

6)

Expert Solution
Check Mark

Explanation of Solution

Determine the subpart that is related to authenticity:

Subpart (2) and Subpart (4) are about authenticity.

7)

Summary Introduction

To determine: The sub-part that is related to integrity.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

7)

Expert Solution
Check Mark

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  6

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine the subpart that is related to integrity:

Subpart (5) is about integrity.

8)

Summary Introduction

To determine: The sub-part that is related to confidentiality.

Introduction:

Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.

8)

Expert Solution
Check Mark

Explanation of Solution

Given diagram:

Accounting Information Systems, Chapter 9, Problem 2SP , additional homework tip  7

A refers the public key of Person H

B refers the private key of Person H

C refers the public key of Person S

D refers the private key of Person S

M refers the message

HT refers the hash total

DS refers the digital signature

Determine the subpart that is related to confidentiality:

Subpart (1) and Subpart (3) are about the confidentially.

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
Select the correct answer(s) for the following multiple-choice questions. Note that there may be more than one correct answer. Which of the following statements is (are) true? a. The type of computer fraud that is simplest and most common and that requires the least amount of skill is data b. The type of computer fraud that is the most difficult because it requires the most skill is computer instructions fraud c. The biggest cause of data breaches is organized by hacker groups. d. Losses from the theft of physical assets are much greater than those from the electronic theft of data e. In the absence of controls, it is not hard for a dishonest employee to steal data.
AC. 1. What kind of big data-based fraud prevention product can be used in fraud monitoring?   2. What kind of big data-based fraud prevention product can be used in fraud risk management?   Please explain with examples
Listed here are two scenarios. For each scenario, discuss the possible damages that can occur.Suggest a preventive control.A. An intruder taps into a telecommunications device and retrieves the identifying codes andpersonal identification numbers for ATM cardholders. (The user subsequently codes thisinformation onto a magnetic coding device and places this strip on a blank bank card.)B. Because of occasional noise on a transmission line, electronic messages received are extremelygarbled.Problem # 4 (30
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Text book image
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,