SlideShare a Scribd company logo
1 of 197
Access Control, Authentication, and Public Key Infrastructure
Lesson 14
Testing Access Control Systems
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
1
Learning Objective and Key Concepts
Learning Objective
Mitigate risk from unauthorized access to IT systems through
proper testing and reporting.
Key Concepts
System penetration testing and reporting
System vulnerability assessment scanning and reporting
Network and operating system (OS) discovery scan
Scope for penetration test plan
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
2
Penetration Testing
Preferably called security assessment
Process of actively evaluating your information security
measures
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Purpose of Testing Access Control Systems
Testing ensures that weaknesses are found and can be dealt with
before they are exploited
Tests should incorporate testing methodologies at different
stages of development:
Software design
Hardware development
Penetration testing
Penetration testing: The act of simulating an attack on an
organization’s resources
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3/30/2015
4
The Software Development Life Cycle
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
What Needs to Be Tested?
Let’s discuss!!
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
All parts of the way that your organization captures, stores, and
processes information can be assessed; the systems that the
information is stored in, the transmission channels that
transport it, and the processes and personnel that manage it.
Off-the-shelf products: operating systems, applications,
databases, networking equipments etc.
Bespoke development products: dynamic Web sites, in-house
applications etc.
Telephony products: war-dialing, remote access etc.
Wireless products: Wireless fidelity (Wi-Fi), Bluetooth etc.
Personnel: screening process, social engineering etc.
Physical: access controls, dumpster diving etc.
3/30/2015
6
The Security System Life Cycle
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Security Monitoring, Incident Handling, and Testing
Monitoring and incident handling are the day-to-day activities
Testing and upgrading system usually occurs annually
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3/30/2015
8
Security Monitoring, Incident Handling, and Testing (Cont.)
Testing functionality of original design
Before purchase of new system, perform risk assessment on old
system
Determine existing major weaknesses
Development of test plan and scope
Impact/vulnerabilities
Breach planning
Gap analysis
Intrusive versus nonintrusive testing
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3/30/2015
9
Vulnerability Scanners
Attempts to identify vulnerabilities in the hosts scanned
Helps identify out-of-date software versions, applicable
patches, or system upgrades
Validates compliance with or deviations from the organization's
security policy
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Vulnerability scanners take the concept of a port scanner to the
next level. Like a port scanner, a vulnerability scanner
identifies hosts and open ports, but it also provides information
on the associated vulnerabilities (as opposed to relying on
human interpretation of the results). Most vulnerability scanners
also attempt to provide information on mitigating discovered
vulnerabilities.
Vulnerability scanners provide system and network
administrators with proactive tools that can be used to identify
vulnerabilities before an adversary can find them. A
vulnerability scanner is a relatively fast and easy way to
quantify an organization's exposure to surface vulnerabilities.
3/30/2015
10
Common Vulnerability Scanners
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Network-based scanners are used primarily for mapping an
organization's network and identifying open ports and related
vulnerabilities. In most cases, these scanners are not limited by
the operating system of targeted systems. The scanners can be
installed on a single system on the network and can quickly
locate and test numerous hosts.
Host-based scanners have to be installed on each host to be
tested and are used primarily to identify specific host operating
system and application misconfigurations and vulnerabilities.
As host-based scanners are able to detect vulnerabilities at a
higher degree of detail than network-based scanners, they
usually require not only host (local) access but also a “root” or
administrative account.
3/30/2015
11
Network-based scanners
Host-based scanners
Benefits of Vulnerability Scanning
Identifies:
Active hosts on network
Active and vulnerable services (ports) on hosts
Applications and banner grabbing
Operating systems
Vulnerabilities associated with discovered operating systems
and applications
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3/30/2015
12
Benefits of Vulnerability Scanning (Continued)
Misconfigured settings
Testing compliance with host application usage or security
policies
Establishing a foundation for penetration testing
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3/30/2015
13
Zenmap Configuration Screen
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Sample Nmap Report in Zenmap GUI
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Nessus® Configuration Screen
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Sample Nessus® Report
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Retina Configuration Screen
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Sample Retina Report
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Gap Analysis Within the Seven Domains of a Typical IT
Infrastructure
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3/30/2015
20
Penetration Testing and Teams
Penetration testing:
Is most accurate way to assess an infrastructure’s true
vulnerability
Simulates actual attack
Is an intrusive testing method
Is risky for the attacking team
Pen test team members should carry authorization memo from
upper management
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3/30/2015
21
Seven Domains of a Typical IT Infrastructure
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
From a business perspective, penetration testing helps safeguard
your organization against failure, through:
Preventing financial loss through fraud (hackers, extortionists
and disgruntled employees) or through lost revenue due to
unreliable business systems and processes
Proving due diligence and compliance to your industry
regulators, customers and shareholders. Non-compliance can
result in your organization losing business, receiving heavy
fines, gathering bad public relations, or ultimately failing. At a
personal level it can also mean the loss of your job,
prosecution, and sometimes even imprisonment.
Protecting your brand by avoiding loss of consumer confidence
and business reputation
3/30/2015
22
Rules of Engagement
Specific Internet Protocol (IP) addresses or ranges to be tested
Any restricted hosts, systems, and subnets not to be tested
A list of acceptable testing techniques, such as social
engineering and denial of service (DoS), and tools, such as
password crackers and network sniffers
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Formal permissions are often called the rules of engagement.
3/30/2015
23
Rules of Engagement (Continued)
Times when testing is to be conducted (for example, during
business hours, after business hours)
Identification of a finite period for testing
IP addresses of the machines from which penetration testing
will be conducted
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Formal permissions are often called the rules of engagement.
IP addresses help administrators to differentiate the legitimate
penetration testing attacks from actual malicious attacks.
3/30/2015
24
Penetration Testing Teams
Red Team
The attacker
Blue Team
The defending team
Attacker and defender know test is taking place
Tiger Team
External testers who operate in a double-blind penetration test
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3/30/2015
25
Performing the Penetration Test: Methodology
Technological, or focus on uncovering weaknesses to social
engineering
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3/30/2015
26
Planning and preparation
Information gathering
Vulnerability detection
Penetration attempt
Analysis and reporting
Clean-up
Preparing the Final Test Report
Identify gaps and risk exposures and assess impact
Develop remediation plans for closing identified security gaps
prioritized by risk exposure
Prepare cost magnitude estimate
Prioritize security solutions based on risk exposure
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
3/30/2015
27
Summary
System penetration testing and reporting
System vulnerability assessment scanning and reporting
Network and operating system (OS) discovery scan
Scope for penetration test plan
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Virtual Lab
Authenticating Security Communications with Digital
Signatures
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
If your educational institution included the Jones & Bartlett
labs as part of the course curriculum, use this script to introduce
the lab:
"In this lesson, you learned that testing is a crucial activity for
any IT department because it provides assurance that access
controls and other security systems are working as designed.
In the lab for this lesson, you will use the encryption utility
GnuPG (GPG) to test the security of the message transmission.
To do that, you will create a digitally signed message for
another user. Then, you will retrieve that message (as the other
user) and use GPG to verify the digital signature."
3/30/2015
29
OPTIONAL SLIDES
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Security Auditing
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Define the physical scope of audit
Document audit results
Specify and implement new/updated controls
Perform security risk assessment
Develop the audit plan
Define the process scope of the audit
Conduct historical due diligence
Purpose of Security Audit
How difficult are passwords to crack?
Do network assets have access control lists?
Do access logs exist that record who accesses what data?
Are personal computers regularly scanned for adware or
malware?
Who has access to back-up media in the organization?
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Security audits are best understood by focusing on the specific
questions they are designed to answer.
3/30/2015
32
Why Conduct a Penetration Test or Vulnerability Scan?
Let’s discuss!!!!
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
From a business perspective, penetration testing helps safeguard
your organization against failure, through:
Preventing financial loss through fraud (hackers, extortionists
and disgruntled employees) or through lost revenue due to
unreliable business systems and processes
Proving due diligence and compliance to your industry
regulators, customers and shareholders. Non-compliance can
result in your organization losing business, receiving heavy
fines, gathering bad public relations, or ultimately failing. At a
personal level it can also mean the loss of your job,
prosecution, and sometimes even imprisonment.
Protecting your brand by avoiding loss of consumer confidence
and business reputation
3/30/2015
33
Penetration Testing—Formal Permissions
Why are formal permissions required to conduct penetration
testing???
Let’s discuss!!
Page ‹#›
Access Control, Authentication, and PKI
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Since penetration testing is designed to simulate an attack and
use tools and techniques that may be restricted by law, federal
regulations, and organizational policies, it is imperative to get
formal permission for conducting penetration testing prior to
starting.
3/30/2015
34
Sheet1CustIDTerritoryIDCustNameShipAddrBillAddrCredLimit
ModifiedDateModifiedTime12Desert Medical7159 Clear Sky
Thicket, Robins Forest West, SC, 29039-9723, US, (864) 930-
37127159 Clear Sky Thicket, Robins Forest West, SC, 29039-
9723, US, (864) 930-37122500001/6/1315:4223Maple
Limited5341 Silent Pond End, Venetie Landing, SD, 57281-
9847, US, (605) 859-64435341 Silent Pond End, Venetie
Landing, SD, 57281-9847, US, (605) 859-
64432500001/27/137:4435Moonlight Medical3625 Lazy Quail
Village, Silver Springs, BC, V7F-2N6, CA, (604) 371-25403625
Lazy Quail Village, Silver Springs, BC, V7F-2N6, CA, (604)
371-25402500002/27/1317:1743Lagoonavigations1659 Harvest
Mountain Street, Triumph, MI, 49961-9208, US, (248) 363-
50891659 Harvest Mountain Street, Triumph, MI, 49961-9208,
US, (248) 363-50892500003/18/138:0755Phantasmedia4513
Fallen Wagon Valley, Phelan, CO, 80076-0422, US, (719) 928-
32354513 Fallen Wagon Valley, Phelan, CO, 80076-0422, US,
(719) 928-32351000004/29/139:2462Radiantelligence4267
Round Rise, Huntington Downs, SC, 29935-1535, US, (864)
460-55814267 Round Rise, Huntington Downs, SC, 29935-
1535, US, (864) 460-
55814000006/8/1314:4571Monarctronics8760 Jagged
Highlands, Hopatcong Hills, DC, 20009-0006, US, (202) 943-
88698760 Jagged Highlands, Hopatcong Hills, DC, 20009-0006,
US, (202) 943-88694000007/18/139:4182Dinowater4258 Easy
Autumn Hill, Basher, MS, 39719-6291, US, (228) 469-
48834258 Easy Autumn Hill, Basher, MS, 39719-6291, US,
(228) 469-488325000010/2/1310:4893Tulipwares3292 Iron
Line, Luttrell, OH, 43059-3950, US, (614) 920-45823292 Iron
Line, Luttrell, OH, 43059-3950, US, (614) 920-
45825000010/25/1317:52103Mazetube1949 Blue Barn Field,
Bailey Cove Estates, OH, 44366-0289, US, (513) 163-11731949
Blue Barn Field, Bailey Cove Estates, OH, 44366-0289, US,
(513) 163-11735000010/26/1310:23112Gold 5216 Cinder
Mountain, Beard, VA, 23543-9363, US, (804) 533-58465216
Cinder Mountain, Beard, VA, 23543-9363, US, (804) 533-
584625000010/31/1310:26121Stardust Medical2169 Pleasant
Zephyr Bank, Williamson, CT, 06824-9749, US, (860) 990-
25052169 Pleasant Zephyr Bank, Williamson, CT, 06824-9749,
US, (860) 990-250525000012/5/1310:53131Typhoon
Enterprises4820 Dewy Willow Acres, Cleveland Mills, CT,
06485-9584, US, (203) 229-35414820 Dewy Willow Acres,
Cleveland Mills, CT, 06485-9584, US, (203) 229-
35412500001/9/1412:33142Grottolutions2677 Red View Way,
Arnot, GA, 39919-9664, US, (470) 777-40782677 Red View
Way, Arnot, GA, 39919-9664, US, (470) 777-
40784000001/25/1415:40152Deserprises7765 Merry Apple
Parade, Belt, GA, 39918-5660, US, (678) 771-84947765 Merry
Apple Parade, Belt, GA, 39918-5660, US, (678) 771-
84945000002/17/1410:49165Shadearts8749 Emerald Quay,
Bosse, HI, 96859-2768, US, (808) 350-65218749 Emerald Quay,
Bosse, HI, 96859-2768, US, (808) 350-
65212500004/18/1416:53173Witchystems9369 Wishing Branch
Estates, Pine Grove Estates, KS, 66333-3165, US, (785) 061-
28859369 Wishing Branch Estates, Pine Grove Estates, KS,
66333-3165, US, (785) 061-
28855000005/13/148:09182Hogpoint2167 Rustic Sky Field,
Edenville, AK, 99954-7494, US, (907) 267-41912167 Rustic
Sky Field, Edenville, AK, 99954-7494, US, (907) 267-
41911000008/11/1415:29192Ravenbar8682 Amber Wagon
Ramp, Wilmot, TN, 37570-0935, US, (901) 231-65298682
Amber Wagon Ramp, Wilmot, TN, 37570-0935, US, (901) 231-
65292500001/12/1515:10203Stormpoly8253 Amber Anchor
Falls, Georgetown, MI, 48872-9449, US, (906) 809-17538253
Amber Anchor Falls, Georgetown, MI, 48872-9449, US, (906)
809-17531000003/6/1512:16211Sprite Devices7482 Foggy
Chase, Bell City, NY, 14494-3874, US, (315) 403-32847482
Foggy Chase, Bell City, NY, 14494-3874, US, (315) 403-
328410000012/5/157:44223Topiary Sales5585 Velvet Fox
Close, North Belgrade Station, NE, 68723-1544, US, (531) 810-
94525585 Velvet Fox Close, North Belgrade Station, NE,
68723-1544, US, (531) 810-
945210000012/26/1515:40231Lioness Medical5656 Golden
Hickory Townline, Indian Creek Estates, QC, G9V-7P0, CA,
(450) 229-25735656 Golden Hickory Townline, Indian Creek
Estates, QC, G9V-7P0, CA, (450) 229-
25731000001/18/1615:29243Midnightelligence7726 Old Edge,
Southburg, ND, 58046-7150, US, (701) 469-41807726 Old
Edge, Southburg, ND, 58046-7150, US, (701) 469-
41805000002/1/168:10251Honeysuckle Inc8747 Heather Elk
Terrace, Rockwood, FL, 34256-3991, US, (239) 673-87818747
Heather Elk Terrace, Rockwood, FL, 34256-3991, US, (239)
673-87812500003/14/1613:02264Grasshop Products7212 Cotton
Square, South Findlay, AZ, 86529-8733, US, (520) 150-
04817212 Cotton Square, South Findlay, AZ, 86529-8733, US,
(520) 150-04812500003/23/1611:05272Hurricane Hospital
Supply8492 Hazy Autumn Subdivision, Quaker Hill, VA,
23583-3752, US, (434) 551-61038492 Hazy Autumn
Subdivision, Quaker Hill, VA, 23583-3752, US, (434) 551-
61034000004/2/1610:30285Wizardfruit7007 Umber Landing,
Bancker, MT, 59603-7909, US, (406) 969-61877007 Umber
Landing, Bancker, MT, 59603-7909, US, (406) 969-
61871000005/4/1610:12291Driftworks6207 Gentle Panda
Freeway, Strawntown, PA, 15081-8581, US, (814) 180-
12516207 Gentle Panda Freeway, Strawntown, PA, 15081-8581,
US, (814) 180-12511000007/3/1613:49303Acewell5787
Colonial Campus, Hunt Crossing, IN, 46696-5345, US, (260)
187-74705787 Colonial Campus, Hunt Crossing, IN, 46696-
5345, US, (260) 187-74702500007/16/1610:38313Enigma
Medical4853 Merry Pine Inlet, Cedar Creek Crossing, IA,
50499-9862, US, (641) 534-04624853 Merry Pine Inlet, Cedar
Creek Crossing, IA, 50499-9862, US, (641) 534-
04622500007/19/1613:29325Monarch Intelligent Devices8897
Hazy Gardens, Property Consultants Condominium, MT, 59904-
3852, US, (406) 528-94938897 Hazy Gardens, Property
Consultants Condominium, MT, 59904-3852, US, (406) 528-
94935000007/29/1611:29331Titanium Supply7610 Green Deer
Run, Epworth Forest, NY, 13399-1593, US, (347) 463-
14427610 Green Deer Run, Epworth Forest, NY, 13399-1593,
US, (347) 463-14421000008/2/1611:46345Icecaproductions8946
High Gate, Shade, BC, V1P-8N4, CA, (604) 968-64218946 High
Gate, Shade, BC, V1P-8N4, CA, (604) 968-
64211000008/17/1617:40352Alpine Medical198 Honey Private,
Livingston, GA, 39881-2053, US, (762) 677-4904198 Honey
Private, Livingston, GA, 39881-2053, US, (762) 677-
49045000008/19/1611:04361Junglectics4658 Green Glen,
Pettyview, DE, 19735-5523, US, (302) 235-48774658 Green
Glen, Pettyview, DE, 19735-5523, US, (302) 235-
48772000009/2/168:40372Electrorks9719 Rustic Deer Isle,
Fremont, FL, 34239-2370, US, (941) 029-80999719 Rustic Deer
Isle, Fremont, FL, 34239-2370, US, (941) 029-
809940000011/9/167:50381Flowernite2445 Noble Chase,
Nekoosa Junction, CT, 06463-8700, US, (475) 559-81622445
Noble Chase, Nekoosa Junction, CT, 06463-8700, US, (475)
559-816215000012/2/1617:43395Griffintube87 Dewy Park,
Harford Estates, UT, 84469-2845, US, (801) 523-975687 Dewy
Park, Harford Estates, UT, 84469-2845, US, (801) 523-
97562500001/8/1710:51401Flipbook Devices7610 Green Deer
Run, Epworth Forest, NY, 13399-1593, US, (347) 463-
14427610 Green Deer Run, Epworth Forest, NY, 13399-1593,
US, (347) 463-14424000001/13/1717:47415Cyclops
Supplies1194 Hidden Woods, Apple Valley, CA, 94739-6226,
US, (530) 151-19151194 Hidden Woods, Apple Valley, CA,
94739-6226, US, (530) 151-19151000001/31/1717:19425Quad
Tech2798 Rocky Treasure Wharf, Belfast, CA, 93270-2109, US,
(408) 534-69532798 Rocky Treasure Wharf, Belfast, CA,
93270-2109, US, (408) 534-
69535000002/9/179:31432Timberlake Medical916 Cozy Lake
Mall , Alexandria, DC, 20068-4808, US, (202) 629-8790916
Cozy Lake Mall , Alexandria, DC, 20068-4808, US, (202) 629-
87902500002/22/1717:53443Champrod Devices108 Noble
Front, Beasley Road, KS, 67297-6901, US, (316) 630-6852108
Noble Front, Beasley Road, KS, 67297-6901, US, (316) 630-
68522500003/8/1715:03454White Wolf Supplies9488 Stony
Pony Villas, Mumurva, AZ, 86560-1324, US, (480) 454-
20659488 Stony Pony Villas, Mumurva, AZ, 86560-1324, US,
(480) 454-
20651000003/16/1714:29465Tempestechnologies7437 Old
Horse Estates, Hudson, CA, 95853-4288, US, (562) 595-
09467437 Old Horse Estates, Hudson, CA, 95853-4288, US,
(562) 595-09462500003/16/1710:50473TitaniuMedical431
Tawny Farms, North Waterford, SD, 57666-2528, US, (605)
982-3469431 Tawny Farms, North Waterford, SD, 57666-2528,
US, (605) 982-34691000003/22/1715:33482Bluestar2024 Sunny
Cloud Manor, Vacaville, VA, 23395-6366, US, (276) 942-
16182024 Sunny Cloud Manor, Vacaville, VA, 23395-6366, US,
(276) 942-16181000003/26/1712:06494Pixelwater1943 Emerald
Ridge, Cherryland, NM, 87280-4951, US, (505) 477-26451943
Emerald Ridge, Cherryland, NM, 87280-4951, US, (505) 477-
26451000004/5/1716:19505Woodbite8441 Broad Private,
Rinckel, MT, 59469-0085, US, (406) 532-35088441 Broad
Private, Rinckel, MT, 59469-0085, US, (406) 532-
35082500004/5/1711:05511Whiz Systems6767 Burning
Landing, Kellys Ford, RI, 02972-0366, US, (401) 772-86166767
Burning Landing, Kellys Ford, RI, 02972-0366, US, (401) 772-
86162500004/6/1712:15522Sharkfin Industries6596 Velvet
Hickory Place, Sebastian, FL, 32413-2068, US, (305) 269-
99126596 Velvet Hickory Place, Sebastian, FL, 32413-2068,
US, (305) 269-99121000004/22/1715:21535Beta Sports
Medicine9455 Indian Woods, Minquadale Trailer Village, OR,
97402-5800, US, (503) 883-64739455 Indian Woods,
Minquadale Trailer Village, OR, 97402-5800, US, (503) 883-
64734000004/23/1712:08542Signetworks9611 Middle Lagoon
Highway, Blakeslee, MS, 39445-4887, US, (662) 005-58459611
Middle Lagoon Highway, Blakeslee, MS, 39445-4887, US,
(662) 005-58452500005/5/1715:09553Starlightning9256 Easy
Apple Corner, Sunny Hill, ND, 58861-1563, US, (701) 318-
82379256 Easy Apple Corner, Sunny Hill, ND, 58861-1563, US,
(701) 318-82371000005/30/1712:42562Melonetworks4948
Broad Manor, Roseau, LA, 71536-7597, US, (337) 312-
32124948 Broad Manor, Roseau, LA, 71536-7597, US, (337)
312-32122000006/9/1710:01571WaterMalone Devices9298
Rustic Port, South Point, NS, B1G-2J0, CA, (902) 731-
92499298 Rustic Port, South Point, NS, B1G-2J0, CA, (902)
731-92494000006/11/1712:45582Worldgold3818 Sleepy
Carrefour, Gwinner, MS, 38842-1373, US, (769) 831-31263818
Sleepy Carrefour, Gwinner, MS, 38842-1373, US, (769) 831-
31265000006/11/177:55592Soulwell8720 Green Deer Bend,
Whitney Station, WV, 25199-7080, US, (304) 239-25578720
Green Deer Bend, Whitney Station, WV, 25199-7080, US, (304)
239-25572500007/29/1712:11604Blossommedia3371 Heather
Edge, Ritchie, NM, 87634-1549, US, (575) 888-18793371
Heather Edge, Ritchie, NM, 87634-1549, US, (575) 888-
18791000008/12/1711:34615Sharkfin Industries1442 Silver
Impasse, Myrtle Point, WY, 82678-4812, US, (307) 893-
65291442 Silver Impasse, Myrtle Point, WY, 82678-4812, US,
(307) 893-65292500008/15/1717:32624Mountain Medical454
Crystal Cider Stead, Boudreaux, AZ, 85963-0091, US, (928)
582-8877454 Crystal Cider Stead, Boudreaux, AZ, 85963-0091,
US, (928) 582-88772500008/26/178:50631Buzzy Bee
Medical3917 Grand Common, Broad Creek, CT, 06864-0242,
US, (475) 240-87503917 Grand Common, Broad Creek, CT,
06864-0242, US, (475) 240-
87505000009/1/1715:21645Prophecycurity6292 Blue Townline,
Ceres, WY, 83011-5218, US, (307) 787-14846292 Blue
Townline, Ceres, WY, 83011-5218, US, (307) 787-
14842500009/10/1711:25651Squidustries6077 Silent Beacon
Freeway, Athol, DE, 19901-1976, US, (302) 726-26796077
Silent Beacon Freeway, Athol, DE, 19901-1976, US, (302) 726-
26792500009/16/1716:03662Diamontronics1132 Colonial Elk
Chase, Java, MS, 39172-4537, US, (662) 798-84101132
Colonial Elk Chase, Java, MS, 39172-4537, US, (662) 798-
84102500009/19/1716:07672Southern Devices4734 Amber Row,
Plainview, FL, 34444-9097, US, (954) 857-13004734 Amber
Row, Plainview, FL, 34444-9097, US, (954) 857-
13002500009/25/1716:20681Vortexgate8989 Foggy Quay,
Olmstedville, NH, 03519-8492, US, (603) 729-21568989 Foggy
Quay, Olmstedville, NH, 03519-8492, US, (603) 729-
215625000010/6/178:55694Luckytechs6511 Dewy Wagon
Extension, Inniswold, TX, 75429-5739, US, (469) 272-
78756511 Dewy Wagon Extension, Inniswold, TX, 75429-5739,
US, (469) 272-787510000010/14/178:14705Heartbit
Digital6866 Wishing Pathway, Pumpkin Center, HI, 96721-
2610, US, (808) 436-12596866 Wishing Pathway, Pumpkin
Center, HI, 96721-2610, US, (808) 436-
125910000011/7/1713:41711Omegatube5711 Quiet Shadow
Close, Beth Eden, DE, 19758-1981, US, (302) 463-50405711
Quiet Shadow Close, Beth Eden, DE, 19758-1981, US, (302)
463-504010000011/10/1715:28723Karmaman Bionics6767
Bright Point, Hutchinson, ND, 58682-0342, US, (701) 997-
47376767 Bright Point, Hutchinson, ND, 58682-0342, US, (701)
997-473725000011/16/178:20731Goldwater2243 Golden Trace,
Curry, NY, 13977-5298, US, (716) 899-94742243 Golden Trace,
Curry, NY, 13977-5298, US, (716) 899-
947410000011/17/178:27
Field Statistics
Requirement # 2
a)
Since the sales order file is open, click on analysis/ join. The
primary file is the sale order file and the secondary file is the
customer invoice file, match using the sales order ID for both
files, name this file Sales and Customers, select all records in
both files to join
5) Keeping only the Sales and Customer file open, join in the
shipments file as the secondary file, again match on sales order
ID for both files, name this file All Three, select all records in
both files to join
6) Only keep the All Three file open and close all other files.
Click on analysis/direct (this is a direct extract). Name this file
Sales 2017 and in the equations box (click on the little
calculator) you want the invoices that are dated between Jan 1
and Dec 31, 2017. So the formula needs to say greater than
equal to Jan 1 AND less than equal to Dec 31 using the proper
IDEA format when writing formulas.
7) Click on field statistics to verify the net value.
History File
Requirement 2
b) Again use direct (direct extraction) and call the file AR
2017. The equation for this part is to look for a paid date
greater than Dec 31 2017. Use the appropriate IDEA formula
3) Run field statistics to verify the total due.
History file
Requirement 4
1) Open sales 2017 from requirement 2. You want to create a
file called three-way match using direct extraction. In the
calculation box look for sales order ID =0 or ship ID=0 or ship
date before invoice data using the appropriate IDEA formula.
b)
1) Make sure all other files are closed. Open sales 2017 join
this file with the customer master file and matching on the
customer ID. Call the file sales wo credit limits and select
records with no secondary match
C)
1) Make sure all other files are closed. Open AR 2017 file from
requirement 2. Click analysis/summarization. Call this file ar by
cust id. Summarize by customer ID and the numeric field to
total is total due.
2) Be sure only the ar by cust id file is open and join this file
with customer master file. Call this new file cr limit except
2017. Match based on customer ID but narrow down the report
to only territory ID, customer name, credit limit and
modification date by selecting fields and only highlighting these
titles (you may have to clear first then highlight the ones you
want). Select all records in primary
3) Only leave open the credit limit except 2017 file and extract
cases where the total due sum is greater than the credit limit.
Call this file AR credit limit except 2017
1) Make sure all other files are closed. Open the AR 2017 file
from requirement 2. Click analysis/summarization. Call this file
ar by cust id. Summarize by customer ID and the numeric field
to total is total due.
d) ) Make sure all other files are closed. Open the AR 2017 file.
Click on analysis/aging. This aging is as of Dec 31 2017 (again
watch the format for dates in IDEA). The aging field is invoice
date and field to total is total due. Select only 30, 60, 90 days.
Call this file aging sched.
Copy and paste the aging report AND copy and paste the detail
on the 5 items over 90 days from this section. Include both
reports here along with your answer
120 days
180 days
History Files
Running head: THE CASE ON URGENT MEDICAL DEVICE,
INC 1
THE CASE ON URGENT MEDICAL DEVICE, INC
2
The Case on Urgent Medical Device, Inc
Part #1
The Case on Urgent Medical Device, Inc
Requirement 1- Fraud Risk
Auditors have a responsibility in identifying fraud risk in
revenue recognition because they are guided by bodies such as
the Public Company Accounting Oversight Board-PCOB, and
auditing standards. For instance, PCOB mandates auditors to
plan and perform audits with the aim of obtaining reasonable
assurance that the financial statements are free of error or fraud
(Public Company Accounting Oversight Board-PCOB, 2019).
a.
Fraud Risk Factor
Accounts Affected
Audit Assertions
(AU Section 326)
Possible issue based on the risk factor identified
1. Pressure
Customer Invoices
There is pressure for distributors to increase sales
The need to increase sales triggers distributors to persuade
customers to make orders. As such, the distributors are paid for
sales orders that have not been delivered
2. Nature of control environment
Sales orders
There are many related transactions
The information on sales orders is for 3-way match control.
That means sales orders that have not been shipped but have
been invoiced are difficult to track
3. Nature of items
Product
There are products with similar weights
The products with similar weights have different unit prices; as
such, accountants might swap the prices leading to financial
loss to the organization.
b. The solutions to the identified risk factors include reducing
the level of pressure exerted to the distributors to make orders
even before the customers place the orders
The organization should establish a controlled environment in
which sales orders are counter checked with the shipment data
to prove that the orders have been delivered before the
distributors are paid.
In the case of the nature of the items, the organization should
vary the weight of the products so that there is no swapping of
prices between cheap and expensive products.
Requirement 2:
Requirement 3: Areas of risk
A
Memorandum
To : The Chief Executive Officer,
From : Data Analyst,
Date : November 25th, 2019.
Subject: ANALYSISOF DATA FROM URGENT MEDICAL
DEVICE INC.
The data on shipment ID, invoice ID, and sales order ID was
entered in tableau software and the resulting graph showed that
the organization used the information to cross check for
consistency. As such, it was a control measure. However, it is
difficult to identify when sales order ID and the invoice ID are
not matching because there is no comparison of the two data. In
cognizant of the challenge, it is necessary that the sales order
data is compared directly with the shipment data and with the
invoice data because there are scenarios where the sales orders
have been received, customer invoice has been delivered but the
products have not been shipped.
In relation to territory and sales goal quarter, the analysis
revealed some territories that were allocated relatively lower
sales goal quarters. It creates difficulties in comparing the
performance of different territories. For instance,Northeast and
West territories have higher sales goal quarter allocations while
Southwest has the lowest. The analysis also revealed that a
product called hinged titanium axle has the highest unit price
while the standard cost is relatively low.Comparatively, it has
the biggest profit margin.
B
Summarily, the three charts show that some products made
by the organization have a higher profit margin compared to
others. It also showed that some territories had higher sales
quarters compared to others.
References
Public Company Accounting Oversight Board-PCOB (2019). AS
2401: Consideration of Fraud in a Financial Statement Audit.
Web. Accessed on 26/11/2019
© 2018 KPMG LLP, a Delaware limited liability partnership
and the U.S. member firm of the KPMG network of independent
member firms affiliated with KPMG
International Cooperative (“KPMG International”), a Swiss
entity. All rights reserved. NDPPS 741662
1
Urgent Medical Device, Inc.
A Teaching Case Designed to Integrate Data and Analytics in
the
Financial Statement Auditing Classroom
By
Allen D. Blay – Florida State University
Jay C. Thibodeau – Bentley University
Background
Urgent Medical Device, Inc. (the Company) is a medical device
company founded in 2013 in Provo,
Utah that specializes in the development and manufacturing of
cutting-edge medical devices designed
for all types of joint replacement surgeries. In January 2015, the
FDA approved Urgent’s premier
product, a hinged titanium axle designed to provide physicians
with more precise placement of joints
during joint replacement surgery.
In early 2016, approximately one year after the new product’s
approval, the Company hired a new
senior vice president (SVP) of sales to oversee sales, physician
training, product delivery, and customer
service. The broad set of responsibilities allowed the
charismatic SVP to significantly influence the
Company’s revenue generation. The hiring of the new SVP was
also done in large part to help guide
the company’s development of an important new sales channel:
third-party distributors that are each
strategically located in close proximity to key hospitals in
regions around the country.
The move to hire the SVP was in direct response to
overwhelming disappointment about the first
year’s sales volume for the new surgical implant, which was
lagging significantly behind expectations.
Reports from the field led management to recommend the new
sales channel to the board of directors
that overwhelmingly approved the new strategy, the execution
of which was being led by the new
SVP.
Execution of strategy
To help execute the new strategy, the SVP hired five regional
sales managers who would become his
trusted cohorts. Together, they set aggressive sales targets for
the Company’s surgical implants. The
sales targets focused on achieving a growth pattern that was
characterized by a record high sales
volume for each successive quarter in each region. In fact, it is
fair to say that the sales targets were
intentionally created at almost unreachable levels to remove any
question about possible weakness in
demand for the Company’s new product.
The strategy focused on the development of a new sales channel
with third-party distributors. Each of
the distributors had already established close relationships with
the physicians that were actually using
the product during surgical procedures. To help pay for the
launch of their new product, along with the
execution of the new strategy, the Company was also working
hard to raise a significant amount of
new investment capital to fund the resulting increased operating
costs. In order to be successful in
attracting the new investment capital, top management made it
clear to the SVP how important it was
to report strong sales for its premier product, the surgical
implant for titanium joints. The SVP, in turn,
passed along the same message to the regional sales managers.
© 2018 KPMG LLP, a Delaware limited liability partnership
and the U.S. member firm of the KPMG network of independent
member firms affiliated with KPMG
International Cooperative (“KPMG International”), a Swiss
entity. All rights reserved. NDPPS 741662
2
Management control philosophy
The upper management team of Urgent can be described as
being aggressive in business practices
and often emphasizes speed and efficiency when implementing
their decisions. Management rarely
hires external consultants because they are of the opinion that
consultants are too expensive and often
follow a conservative approach. The upper management team
meets regularly with its key managers.
In general, the upper management team has cooperated with the
audit team in order to provide fair
and adequate financial reporting, but there have been
disagreements in the past. The Company has a
strict policy for following all established internal control
procedures.
Incentive compensation
Top management focuses significant attention on achieving
short-term performance measures based
on the audited financial statements when determining
compensation and making promotion decisions.
Revenue earned is the most important criterion in performance
assessment throughout the
organization. As part of the launch of its new surgical implant,
a new bonus plan was established to
provide additional incentives for the entire organization to
focus on this new opportunity, with revenue
earned as the key criterion used to determine incentive
compensation.
Preliminary results
Despite the SVP’s optimism about sales in 2017, internal
reports have indicated that the actual sales
volume of the surgical implant was well below budget each
quarter. The SVP responded to these
reports by repeatedly communicating his disappointment to the
regional sales managers. Furthermore,
he consistently warned that if the team could not boost sales,
the Company would likely not be able to
raise additional investment capital and would then be forced to
significantly downsize its headcount.
Unfortunately, boosting revenue of the new surgical implants
was not as simple as merely shipping the
product to distributors. The distributors were hesitant to
purchase product until the sale to the final
customer was finalized as the distributors did not want to be
stuck with the inventory on their own
balance sheets. Further, the terms of the sales do not include
any refund or rebate conditions. In
addition, the Company has no intention of changing those terms
and accepting any return. Therefore,
any sale to distributors are final.
By the end of 2017, the Company had signed on a total of 73
distributors to sell its surgical implants in
more than 20 different states throughout the United States. Each
distributor was independently owned
and operated but the company routinely shared best practices
among its network. The SVP monitored
sales closely from the distributor network through his regional
sales managers. In fact, he even
maintained a monthly sales report from each of the 73
distributors.
The Company invoices customers when the goods are shipped,
and invoicing triggers the recording of
revenue. The Company does not include freight costs in sales
revenue but does offset shipping costs
with any freight charged to customers.
The following relevant financial data is taken from the
Company’s unaudited trial balance, which was
used to produce the unaudited financial statements:
Sales revenue, year ended 12/31/2017 $84,867,855
Gross accounts receivable, 12/31/2017 $11,988,886
© 2018 KPMG LLP, a Delaware limited liability partnership
and the U.S. member firm of the KPMG network of independent
member firms affiliated with KPMG
International Cooperative (“KPMG International”), a Swiss
entity. All rights reserved. NDPPS 741662
3
Audit approach
Your audit team is currently in the midst of year-end testing in
the revenue and accounts receivable
cycle for the audit of the calendar year 2017 financial
statements. Your testing will focus on the
existence/occurrence, cutoff, and accuracy assertions for sales
revenue, as well as the existence and
valuation assertions for accounts receivable. As relationships
with third-party distributors generally
require significant contract analysis to ensure the
appropriateness of when revenue is recognized, the
audit team expects more hours to be spent this year testing
revenue and accounts receivable as
compared to the prior year. In addition to the procedures you
will perform, the audit team will also
confirm accounts receivable and perform other procedures
according to the audit plan. The audit team
has assessed the risk of material misstatement (RMM) for each
relevant assertion in order to
determine the nature, timing, and extent of the procedures to be
performed at Urgent.
Other members of the audit team have already completed a
walk-through of the revenue and accounts
receivable processes, identified “what could go wrongs” within
the process, and identified the
controls that have been placed in operation to mitigate the risks.
Based on the work performed, the
team decided to test the operating effectiveness of certain key
controls during interim testing. The
results are found below.
Tests of controls – Revenue and accounts receivable cycle –
Interim
There are four key application controls tested at interim. Prior
to testing the application controls, the
information technology (IT) auditors tested the general controls
(GITCs) over program changes, access
to programs, and computer operations that are relevant to the
revenue and accounts receivable cycle.
The GITCs were found to be effective and can be relied upon to
support the effective operation of
application controls. In addition, the IT auditors tested the
system to make sure that proper segregation
of duties occurred throughout the period and that controls over
data input, data integrity, and the
completion and accuracy of data used in the four application
controls were operating effectively. No
exceptions were noted in the testing performed by the IT
auditors, and the team decided to test the
four key application controls.
The first control is an automated three-way sales match. The
control matches the details from 1) an
approved sales order; 2) relevant shipping documents; and 3)
the sales invoice before revenue is
recorded. The control has been designed to support the
existence/occurrence assertion for revenue. A
test of the control’s operating effectiveness was conducted at
the interim. No exceptions were noted.
The second control requires the credit department at Urgent to
conduct a detailed credit check for all
new customers, including the new distributors. To do so, the
credit department obtains information
from the customer that allows for a comprehensive review of the
financial condition of the new
customer and an assessment of the customer’s capacity to pay
outstanding invoices. The control
culminates with an approval of the new customer and the
establishment of a credit limit by the credit
department manager based on the information reviewed. A test
of the control’s operating
effectiveness was conducted at interim. No exceptions were
noted.
The third control is an automated sales authorization control.
When a sales order is entered into the
system, the amount of the sale is added to the existing accounts
receivable balance for that customer.
The sum is then compared to the customer’s credit limit. If the
sum is greater than the credit limit, the
sale is not approved. If the sum is less than the credit limit, the
sale is approved. A credit manager
notes the approval and authorizes shipment by electronically
entering their initials into the system,
which gets posted into the sales order database. A test of the
control’s operating effectiveness was
conducted at interim. No exceptions were noted.
© 2018 KPMG LLP, a Delaware limited liability partnership
and the U.S. member firm of the KPMG network of independent
member firms affiliated with KPMG
International Cooperative (“KPMG International”), a Swiss
entity. All rights reserved. NDPPS 741662
4
The fourth control is a monthly review of the adequacy of the
allowance for doubtful accounts,
completed by the controller. On a monthly basis, the controller
reviews the aging of accounts
receivable report produced by the company’s information
system. During the review, the controller
identifies for follow-up all balances greater than 90 days past
due for consideration in the allowance
calculation. A test of the control’s operating effectiveness was
conducted at interim. No exceptions
were noted.
Roll-forward period
By the end of the third quarter of 2017, sales revenue for the
company’s premier surgical implant was
still lagging far behind expectations. To help ensure that Urgent
delivered impressive fourth quarter
revenue numbers, the entire sales team, led by the SVP and the
regional sales managers, began to
exert pressure on a number of distributors in an attempt to
improve sales in 2017. This effort seemed
to be paying off as the sales team successfully persuaded more
than a dozen distributors to purchase
product in advance of final customer demand.
These circumstances presented a problem for the Company,
because the distributors began to ask for
concessions from Urgent Medical. For example, in order to
persuade the distributors, the Company
agreed to hold the inventory in their own warehouse.
The SVP’s actions led to a dramatic increase in revenue for the
fourth quarter of 2017. In fact, sales
increased year-over-year by 214 percent for the fourth quarter
alone. The upward trajectory of sales
revenue helped the Company raise the much-needed investment
capital as Urgent issued more than
10 million shares of common stock for $40 million in early
2018.
Most importantly, roll-forward testing procedures were
completed for each of the four key application
controls. No exceptions were noted in the roll-forward
procedures. Thus, the audit team concluded that
the controls were operating effectively throughout the year.
Substantive testing – Revenue and accounts receivable
cycle – Final
As a result of the tests of controls, the audit team assessed the
control risk as low for the
existence/occurrence, cutoff, and the accuracy assertions for
revenue and the valuation assertion for
accounts receivable. Since the recognition of revenue is a
presumed fraud risk, along with the
significant risk of sales cutoff related to the launch of the new
surgical implant, the audit team
concluded that fraud risk related to the timing of revenue
recognition over period-end is high. Overall,
based on the control risk assessment as low and the inherent
risk assessment of high, the overall
assessment of RMM is moderate for each of the assertions. In
response to the RMM assessment, the
audit team has asked that you complete a number of substantive
testing procedures. In addition, since
your manager is trying to improve the efficiency and
effectiveness of substantive testing, you have
been asked to use two technological tools, IDEA and Tableau,
to facilitate identification of potential
concerns related to the substantive testing for the revenue and
accounts receivable cycle. Urgent has
provide you with the following databases to facilitate your
testing.
Database definitions for data provided
1. SalesOrders – Urgent has provided the SalesOrders database,
which includes a master listing of
all customer orders placed during the year. The client has
informed you that the database also
includes sales orders from the prior year that were not
completed until the current year, as well as
orders taken this year that were not delivered to customers as of
12/31. This database is also the
client’s primary database for the three-way match control. When
an order is shipped or invoiced,
the system automatically posts the ShipID or InvoiceID to the
SalesOrders database.
© 2018 KPMG LLP, a Delaware limited liability partnership
and the U.S. member firm of the KPMG network of independent
member firms affiliated with KPMG
International Cooperative (“KPMG International”), a Swiss
entity. All rights reserved. NDPPS 741662
5
Column name Column description Field type
SalesOrderID Customer order number – Primary Key Numeric
(int)
OrderDate Date the customer order was created Date
MM/DD/YYYY
ProdID Product Number. Foreign Key to
Products.ProdID
Character
CustID Distributor Number. Foreign Key to
CustomerMaster.CustID
Numeric (int)
TerritoryID Territory in which the sale was made.
Foreign key to SalesTerritory.TerritoryID
Numeric (int)
Quantity Quantity Ordered Numeric (int)
UnitPrice Price per unit Numeric (dollars)
SubTotal Sales subtotal, amount included in Sales
Revenue
Numeric (dollars)
TaxAmt Tax amount Numeric (dollars)
Freight Shipping Cost Numeric (dollars)
TotalDue Total due from customer, amount posted
to Accounts Receivable
Numeric (dollars)
CredApr Credit Approval – Initials of CM Character
ShipID Shipping ID number – Foreign key to
Shipments.ShipID
Numeric
InvoiceID Invoice ID number – Foreign key to
Invoice.InvoiceID
Numeric
ModifiedDate Date the row was last updated Date
MM/DD/YYYY
ModifiedTime Time the row was last updated Time (24-hour)
2. Shipments – Urgent has provided you with the Shipments
database, which includes a listing of all
shipments made during fiscal 2017, as well as shipments of
products ordered during 2017 and not
shipped until 2018.
Column name Column description Field type
ShipID Shipping ID Number – Primary Key Numeric (sequential
int)
SalesOrderID Sales order number – Foreign key to
SalesOrders.SalesOrderID
Numeric (int)
ShipDate Date of shipment Date
MM/DD/YYYY
ShipWeight Total Weight of Shipment Numeric (int)
Carrier Shipping Carrier Character
ModifiedDate Date the row was last updated Date
MM/DD/YYYY
ModifiedTime Time the row was last updated Time (24-hour)
© 2018 KPMG LLP, a Delaware limited liability partnership
and the U.S. member firm of the KPMG network of independent
member firms affiliated with KPMG
International Cooperative (“KPMG International”), a Swiss
entity. All rights reserved. NDPPS 741662
6
3. CustomerInvoices – Urgent has provided you with the
CustomerInvoices database, which
includes a listing of all invoices issued during 2017, as well as
invoices for sales orders taken
during 2017 but not delivered to customers until 2018.
Column name Column description Field type
InvoiceID Invoice number – Primary Key Numeric (sequential
int)
CustID Distributor ID number - Foreign key to
CustomerMaster.CustID
Numeric (int)
InvoiceDate Date of sales invoice Date
MM/DD/YYYY
SalesOrderID Sales Order ID – Foreign key to
SalesOrders
Character
PaidDate Date invoice paid, 9/9/9999 is unpaid Date
MM/DD/YYYY
ModifiedDate Date the row was last updated Date
MM/DD/YYYY
ModifiedTime Time the row was last updated Time (24-hour)
4. SalesTerritory – Urgent has provided you with this database
listing the sales territories, as well as
the sales goals for the fourth quarter of 2017 for all territories.
Column name Column description Field type
TerritoryID Territory Identification Number –
Primary Key
Numeric (int)
TerritoryName Name of Sales Territory Character
SalesVP Name of Sales VP for Territory Character
SalesGoalQTR Quarterly Territory Sales Goal Numeric (dollars)
ModifiedDate Date the row was last updated Date
MM/DD/YYYY
ModifiedTime Time the row was last updated Time (24-hour)
5. CustomerMaster – Urgent has provided you with the
CustomerMaster database, which is a listing
of all distributors. It classifies distributors by territory and also
includes the most current credit limit
for the customer. This credit limit is used for the automated
credit limit check control.
Column name Column description Field type
CustID Distributor ID number – Primary Key Numeric (int)
TerritoryID Territory in which the customer is
located. Foreign key to
SalesTerritory.TerritoryID
Numeric (int)
CustName Distributor Name Character
ShipAddr Distributor Shipping Address Character
© 2018 KPMG LLP, a Delaware limited liability partnership
and the U.S. member firm of the KPMG network of independent
member firms affiliated with KPMG
International Cooperative (“KPMG International”), a Swiss
entity. All rights reserved. NDPPS 741662
7
Column name Column description Field type
BillAddr Distributor Billing Address Character
CredLimit Credit Approval Limit Numeric (dollars)
ModifiedDate Date the row was last updated Date
MM/DD/YYYY
ModifiedTime Time the row was last updated Time (24-hour)
6. Products – Urgent provided the Products database, which
includes a listing of all products
currently manufactured and sold by the company. The UnitPrice
is the current verified selling price
and is automatically populated in SalesOrders when a customer
places an order. Similarly, the
weight determines the freight charged to customers.
Column name Column description Field type
ProdID Product ID number – Primary Key Numeric (int)
ProdName Product Name Character
SafetyStockLevel Minimum inventory quantity Numeric (int)
ReManPoint Inventory level that triggers
manufacturing additional product
Numeric (int)
StandardCost Standard manufacturing cost of product Numeric
(dollars)
UnitPrice Selling price Numeric (dollars)
Weight Shipping Weight of Product Decimal (8,2)
DaysToMan Number of days required to manufacture
the product
Numeric (int)
SellStartDate Date the product was available for sale Date
MM/DD/YYYY
ModifiedDate Date the row was last updated Date
MM/DD/YYYY
ModifiedTime Time the row was last updated Time (24-hour)
Your firm’s Data and Analytics center has already converted the
files, as provided by the client, into
Excel format. As such, the contents and format of the databases
you have been provided are exactly
the same as they were provided by the client.
Requirements
1. According to the professional auditing standards, an audit
team should ordinarily presume that
revenue recognition is a fraud risk. Complete the following
steps.
a. Based on your understanding of fraud risk assessment and the
case information, identify at
least three specific fraud risk factors related to Urgent. Classify
these risks in terms of What
Can Go Wrong (WCGW) with each of the significant accounts
and relevant assertions identified
for Urgent’s revenue and accounts receivable cycle.
b. What do you believe is the most significant risk related to the
revenue account for Urgent?
© 2018 KPMG LLP, a Delaware limited liability partnership
and the U.S. member firm of the KPMG network of independent
member firms affiliated with KPMG
International Cooperative (“KPMG International”), a Swiss
entity. All rights reserved. NDPPS 741662
8
c. What special audit considerations would you propose in
response to the significant risk you
identified above? In your response, consider how you would
change your approach to the
nature, timing, and extent of evidence in response to the
identified risk.
2. Based on the tests of controls and other Information
Technology General Controls (ITGC) testing,
your firm has concluded that the data files supplied to you for
your procedures are complete and
accurate. The conclusion was based on tests of controls over
data input risks, including all relevant
data elements (e.g., invoice date), data integrity risks, and the
relevant automated application
controls. However, it is also important to confirm that the data,
once imported into IDEA or
Tableau, was transferred into the technology tool in a complete
and accurate manner prior to
working with the data within the technology tool. Import all
supplied data into IDEA and then
reconcile the data with the supplied trial balance and check
figures from the case. Simply stated,
you must check that the data has been transferred in a complete
and accurate manner at each step
in the process. Thus, to ensure that you are working with the set
of transactions and balances that
the client used to calculate Sales Revenue and Accounts
Receivable, answer the following
questions:
a. What are the total number of valid sales that comprise the
$84,867,855 sales revenue shown
on the trial balance as of 12/31/2017?
b. What are the total number of unpaid invoices that comprise
the $11,988,886 gross accounts
receivable balance shown on the trial balance as of 12/31/2017?
Assume that Urgent has no
outstanding accounts receivable from 2016.
3. Data visualization tools such as Tableau can be used to help
audit teams identify items or specific
areas of higher risk within an entire population. Your data and
analytics center has provided you
with a set of Tableau visualizations to consider during your
substantive testing procedures:
i. Three-way match of SalesOrderID, InvoiceID, and ShipID
based solely on
SalesOrders database
ii. Sales by territory
iii. Sales by distributor
iv. Sales by quarter
v. Sales by territory by quarter
vi. Product sales by territory
vii. Fourth quarter sales by territory
viii. Sales vs. sales goals for fourth quarter by territory
ix. Sales by quarter by territory vs fourth quarter sales goals
a. Using the data visualizations provided in Tableau, compose a
memo to be included in the audit
documentation file that identifies any pattern in the data that
you believe may be indicative of
specific audit risks. In your memo, be sure to link the identified
risks to the appropriate
significant account and relevant assertions.
b. Based on the analysis completed above, what further testing,
if any, needs to be performed
over the identified risks and the remaining population? Stated
differently, do any further tests
need to be performed or does the three-way match visualization,
combined with your tests of
© 2018 KPMG LLP, a Delaware limited liability partnership
and the U.S. member firm of the KPMG network of independent
member firms affiliated with KPMG
International Cooperative (“KPMG International”), a Swiss
entity. All rights reserved. NDPPS 741662
9
controls and additional visualizations, provide you with
sufficient appropriate evidence to
conclude about the occurrence of revenue at Urgent?
4. Technology tools like IDEA can also be used to help audit
teams identify items with potentially
higher risks within an entire population of items in an efficient
and effective manner. With this in
mind, complete the following steps.
a. The SalesOrder database was used to produce a Tableau
visualization of three-way match in
the revenue cycle as described in the previous requirement.
Using IDEA, verify the accuracy of
the SalesOrder database by creating a three-way match on your
own using the SalesOrder,
Shipments, and CustomerInvoices databases. Are your
conclusions the same? If so, how does
this increase your assurance about the accuracy of the
SalesOrder database? If not, why not?
Did you identify any specific transaction that you believe
should be considered higher risk for
the audit?
b. Analyze the sales revenue file using IDEA to determine
whether any sales were made to
distributors without an established credit limit. Are there any
exceptions? If there are
exceptions, what further testing would you perform on these
exceptions?
c. Analyze the accounts receivable and related credit
authorization limits using IDEA to determine
whether any customers have account balances as of 12/31/17
that exceed their existing credit
limit. Are there any exceptions to the credit limit control as of
12/31/17? Do you notice any
pattern in the exceptions? What further testing would you
perform on these exceptions?
d. For some time, Urgent has based its allowance for doubtful
accounts on an aging analysis and
the results have been historically accurate. Below, you have
been provided with the client’s list
of customer balances in excess of 90 days. These are the
accounts that the client will consider
when calculating the allowance for doubtful accounts as of
12/31/2017. Perform an aging
analysis using IDEA to assess the completeness and accuracy of
Urgent’s list of customer
balances in excess of 90 days.
Urgent Medical Devices
Analysis of >90-Day Delinquent Accounts Receivable
As of December 31, 2017
SalesOrderID InvoiceDate TotalDue
3236 7/4/2017 56,251.34
3241 7/9/2017 73,450.67
3422 9/5/2017 73,450.67
3466 9/21/2017 59,932.09
3490 9/27/2017 54,851.15
317,935.92
i. Based on your analysis, does the client’s listing agree to your
analysis completed in
IDEA?
ii. Do you have any concern with the client’s process for
identifying the total amount of
significantly delinquent accounts? You may think broadly,
beyond mechanical accuracy, in
considering the sufficiency of their process for identification of
delinquent accounts.
kpmg.com/socialmedia
iii. According to Urgent’s unaudited trial balance, the balance
for Allowance for Doubtful
Accounts is $310,000. Does the test performed above provide
sufficient appropriate
evidence to support a conclusion on the valuation of accounts
receivable? If not, what
additional testing would you recommend to reach an audit
conclusion for this relevant
assertion?
5. Based on your risk analysis and findings in requirements 1)
through 4), perform additional analyses
using IDEA to identify specific transactions, territories, or
distributors that may require additional
substantive testing. Be creative when doing so. For example,
consider patterns in the data
provided that might indicate management override of a control
activity. Focus your additional
analytics on those areas. Prepare a listing of specific findings
from your additional analytics that you
believe warrant additional testing.
6. In order to conclude on whether the risk of material
misstatement has been reduced to an
acceptably low level for the relevant assertions identified, you
need to consider, on an overall
basis, whether the results of your procedures provide sufficient
appropriate evidence. Based on
the evidence that you have considered, can you reach a
conclusion for the relevant assertions
identified? Why or why not?
Learning objectives of case
1. To understand the fraud risks associated with revenue
recognition and its impact on the testing of
the revenue and accounts receivable cycle (demonstrated when
students complete
requirement 1 of the case).
2. To understand the importance of determining that a
population of data is complete and accurate
prior to its use in audit testing, including understanding how to
reconcile the population to the
underlying books and records of the audit client (demonstrated
when students complete
requirement 2 of the case).
3. To learn how to interpret commonly used data visualizations
and reach audit conclusions based on
the issues, objectives and alternatives that surface given the
observed facts and circumstances
(demonstrated when students complete requirement 3 of the
case).
4. To understand how to utilize commonly used data and
analytics software tools (i.e., IDEA and
Tableau) within a realistic audit context (demonstrated when
students complete requirements
3, 4, and 5 of the case).
5. To develop critical thinking skills around the identification
of exceptions and risk factors in client
provided data (demonstrated when students complete
requirements 3, 4, and 5 of the case).
6. To recognize the importance of reaching an overall
conclusion for each relevant assertion in
accordance with applicable professional standards based on the
evidential matter considered
(demonstrated when students complete requirement 6 of the
case).
© 2018 KPMG LLP, a Delaware limited liability partnership
and the U.S. member firm of the KPMG network of independent
member firms affiliated with KPMG
International Cooperative (“KPMG International”), a Swiss
entity. All rights reserved. NDPPS 741662
The KPMG name and logo are registered trademarks or
trademarks of KPMG International.
The information contained herein is of a general nature and is
not intended to address the circumstances of any particular
individual or entity. Although we endeavor to
provide accurate and timely information, there can be no
guarantee that such information is accurate as of the date it is
received or that it will continue to be accurate in
the future. No one should act upon such information without
appropriate professional advice after a thorough examination of
the particular situation.
This simulation is a work of fiction. Any names of persons,
companies, events or incidents, are fictitious. Any resemblance
to actual persons, living or dead, companies or
actual events is purely coincidental.
The views and opinions expressed herein are those of the
authors and do not necessarily represent the views and opinions
of KPMG LLP.
04/12/2019 11:59 PM
1
For Educational Purposes Only
Database History for C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject 1AR 2017.IMD
Database Date User
Data Set_Sales Orders-Sheet1.IMD
Import from Excel 12/4/2019 12:38:12 AM anacr
Imported from: C:UsersanacrGoogle DriveMACCDATA
ANALYTICSW6Data Set_Sales
Orders.xlsx
Data Source: Excel
Sheet Name: Sheet1
Number of records: 1168
First record as title: TRUE
IDEAScript code: Set task =
Client.GetImportTask("ImportExcel")
dbName = "C:UsersanacrGoogle DriveMACCDATA
ANALYTICSW6Data Set_Sales Orders.xlsx"
task.FileToImport = dbName
task.SheetToImport = "Sheet1"
task.OutputFilePrefix = "Data Set_Sales Orders"
task.FirstRowIsFieldName = "TRUE"
task.EmptyNumericFieldAsZero = "TRUE"
task.PerformTask
dbName = task.OutputFilePath("Sheet1")
Set task = Nothing
Client.OpenDatabase(dbName)
Index Database 12/4/2019 12:44:18 AM anacr
Indexed by: SALESORDERID/A
IDEAScript code: Set db = Client.OpenDatabase("Data
Set_Sales Orders-Sheet1.IMD")
Set task = db.Index
task.AddKey "SALESORDERID", "A"
task.Index FALSE
Set task = Nothing
Set db = Nothing
Sales and Customers .IMD
Join Databases 12/4/2019 1:22:32 AM anacr
File name: C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject
1Sales and Customers .IMD
Number of records: 1167
Control field: No Control Total
04/12/2019 11:59 PM
2
For Educational Purposes Only
Database History for C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject 1AR 2017.IMD
Database Date User
Control total: No Control Total
Primary recs rejected: 1
Join primary file: C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject
1Data Set_Sales Orders-Sheet1.IMD
Number of records: 1168
Join secondary file: C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject
1Data Set_Customer Invoices (1)-Sheet1.IMD
Number of records: 1167
Type of join: Matches only
Key used: SALESORDERID/A - SALESORDERID/A
Creating a virtual data... No
IDEAScript code: Set db = Client.OpenDatabase("Data
Set_Sales Orders-Sheet1.IMD")
Set task = db.JoinDatabase
task.FileToJoin "Data Set_Customer Invoices (1)-Sheet1.IMD"
task.IncludeAllPFields
task.IncludeAllSFields
task.AddMatchKey "SALESORDERID", "SALESORDERID",
"A"
task.CreateVirtualDatabase = False
dbName = "Sales and Customers .IMD"
task.PerformTask dbName, "", WI_JOIN_MATCH_ONLY
Set task = Nothing
Set db = Nothing
Client.OpenDatabase (dbName)
All Three.IMD
Join Databases 12/4/2019 1:23:50 AM anacr
File name: C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject
1All Three.IMD
Number of records: 1165
Control field: No Control Total
Control total: No Control Total
Primary recs rejected: 2
04/12/2019 11:59 PM
3
For Educational Purposes Only
Database History for C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject 1AR 2017.IMD
Database Date User
Join primary file: C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject
1Sales and Customers .IMD
Number of records: 1167
Join secondary file: C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject
1Data Set_Shipments (1)-Sheet1.IMD
Number of records: 1165
Type of join: Matches only
Key used: SALESORDERID/A - SALESORDERID/A
Creating a virtual data... No
IDEAScript code: Set db = Client.OpenDatabase("Sales and
Customers .IMD")
Set task = db.JoinDatabase
task.FileToJoin "Data Set_Shipments (1)-Sheet1.IMD"
task.IncludeAllPFields
task.IncludeAllSFields
task.AddMatchKey "SALESORDERID", "SALESORDERID",
"A"
task.CreateVirtualDatabase = False
dbName = "All Three.IMD"
task.PerformTask dbName, "", WI_JOIN_MATCH_ONLY
Set task = Nothing
Set db = Nothing
Client.OpenDatabase (dbName)
Sales 2017.IMD
Record Extraction 12/4/2019 11:40:27 PM anacr
File name: C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject
1Sales 2017.IMD
Number of records: 1156
Control field: No Control Total
Control total: No Control Total
Extraction from: C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject
1All Three.IMD
Number of records: 1165
Indexed by: No index
Extraction Range: 1 - 1165
04/12/2019 11:59 PM
4
For Educational Purposes Only
Database History for C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject 1AR 2017.IMD
Database Date User
Extraction Criteria: INVOICEDATE >= "20170101" .AND.
INVOICEDATE <= "20171231"
Creating a virtual data... No
IDEAScript code: Set db = Client.OpenDatabase("All
Three.IMD")
Set task = db.Extraction
task.IncludeAllFields
dbName = "Sales 2017.IMD"
task.AddExtraction dbName, "", " INVOICEDATE >=
""20170101"" .AND.
INVOICEDATE <= ""20171231"""
task.CreateVirtualDatabase = False
task.PerformTask 1, db.Count
Set task = Nothing
Set db = Nothing
Client.OpenDatabase (dbName)
AR 2017.IMD
Record Extraction 12/4/2019 11:53:34 PM anacr
File name: C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject
1AR 2017.IMD
Number of records: 148
Control field: No Control Total
Control total: No Control Total
Extraction from: C:UsersanacrDocumentsMy IDEA
DocumentsIDEA ProjectsProject
1Sales 2017.IMD
Number of records: 1156
Indexed by: No index
Extraction Range: 1 - 1156
Extraction Criteria: PAIDDATE >= "20171231"
Creating a virtual data... No
IDEAScript code: Set db = Client.OpenDatabase("Sales
2017.IMD")
Set task = db.Extraction
task.IncludeAllFields
dbName = "AR 2017.IMD"
task.AddExtraction dbName, "", " PAIDDATE >=
""20171231"""
task.CreateVirtualDatabase = False
task.PerformTask 1, db.Count
Set task = Nothing
Set db = Nothing
Client.OpenDatabase (dbName)
Sheet1InvoiceIDCustIDInvoiceDateSalesOrderIDPaidDateModif
iedDateModifiedTime100635541/2/1726792/2/172/2/1717:2910
0636621/3/1726812/1/172/1/1710:05100634231/2/1726821/31/1
71/31/1716:30100637191/3/1726832/1/172/1/1711:3210063831/
3/1726842/1/172/1/1710:18100640651/4/1726852/2/172/2/1711:
33100639271/3/1726862/1/172/1/1714:03100641431/4/1726872/
2/172/2/179:21100642311/4/1726882/2/172/2/1711:4310064373
1/5/1726892/4/172/4/178:01100644681/5/1726922/1/172/1/1717
:1910064511/5/1726902/4/172/4/1714:52100646641/5/1726912/
2/172/2/177:40100647181/6/1726932/2/172/2/1712:3410064855
1/6/1726942/4/172/4/1715:47100649131/8/1726962/4/172/4/171
7:30100650451/8/1726952/5/172/5/1712:1810065141/9/1726982
/8/172/8/1716:30100652391/9/1726972/5/172/5/1717:29100653
451/10/1726992/6/172/6/1710:05100654531/10/1727002/8/172/
8/1711:32100655361/11/1727042/10/172/10/1710:18100656661/
11/1727022/10/172/10/1714:0310065721/11/1727032/10/172/10
/1711:33100658451/11/1727012/7/172/7/179:2110065971/12/17
27052/9/172/9/1711:43100660331/12/1727082/8/172/8/178:211
00661561/12/1727092/10/172/10/1711:58100662441/12/172710
2/8/172/8/1712:45100663261/12/1727062/9/172/9/1716:081006
6431/12/1727072/10/172/10/1717:19100665581/13/1727122/10/
172/10/179:3610066641/13/1727112/10/172/10/1713:551006673
1/13/1727132/9/172/9/177:5210066831/13/1727142/11/172/11/1
79:44100669121/14/1727152/10/172/10/177:5510067021/14/172
7172/10/172/10/1716:06100671441/14/1727192/13/172/13/178:
11100672241/14/1727162/13/172/13/1711:1210067351/14/1727
182/13/172/13/1717:58100674641/14/1727202/12/172/12/1712:
57100675671/15/1727222/13/172/13/1717:52100676341/15/172
7212/12/172/12/1716:24100677521/16/1727232/14/172/14/1715
:09100678191/16/1727262/14/172/14/177:42100679221/16/1727
252/14/172/14/1715:00100680301/16/1727242/12/172/12/177:3
0100681561/17/1727272/15/172/15/1712:14100682241/17/1727
302/16/172/16/177:47100683171/17/1727282/15/172/15/1717:1
610068451/17/1727292/13/172/13/179:51100685561/18/172732
2/15/172/15/1713:20100686601/18/1727312/15/172/15/179:271
00687401/19/1727362/18/172/18/1710:5310068861/19/1727352/
16/172/16/1716:37100689451/19/1727332/18/172/18/1710:3410
0690341/19/1727342/17/172/17/1712:45100691651/22/1727372/
20/172/20/1714:1410069271/22/1727382/20/172/20/1715:00100
693351/22/1727402/19/172/19/1712:24100694721/22/1727392/1
9/172/19/178:32100695131/23/1727442/19/172/19/1715:511006
96521/23/1727432/21/172/21/1712:41100697191/23/1727422/19
/172/19/1711:40100698111/23/1727452/19/172/19/1710:071006
99691/23/1727462/19/172/19/1712:22100700501/23/1727412/21
/172/21/1712:15100701631/25/1727482/22/172/22/1711:201007
0281/25/1727472/22/172/22/1717:07100703141/26/1727492/22/
172/22/1714:55100704111/26/1727502/23/172/23/1714:4010070
5261/26/1727512/25/172/25/1711:47100706411/26/1727522/24/
172/24/1716:43100707271/27/1727552/26/172/26/1710:2410070
821/27/1727542/25/172/25/1710:48100709461/27/1727532/23/1
72/23/1711:52100710531/27/1727562/23/172/23/1712:54100711
631/28/1727582/24/172/24/1712:28100712201/28/1727572/24/1
72/24/1717:01100713301/28/1727602/26/172/26/1715:41100714
91/28/1727592/24/172/24/1714:58100715231/29/1727612/27/17
2/27/1715:26100716561/29/1727622/27/172/27/1715:351007173
51/30/1727652/28/172/28/1710:42100718621/30/1727662/26/17
2/26/178:53100719421/30/1727633/1/173/1/178:1610072051/30
/1727643/1/173/1/1710:31100721361/31/1727703/2/173/2/1711:
52100722661/31/1727673/1/173/1/1710:20100723551/31/17276
82/27/172/27/1716:21100724421/31/1727693/2/173/2/179:0910
0725672/1/1727723/3/173/3/1715:25100726452/1/1727713/3/17
3/3/1717:05100727272/3/1727733/3/173/3/1711:07100728562/3
/1727753/4/173/4/1717:14100729222/3/1727763/2/173/2/1715:5
1100730642/3/1727743/5/173/5/1716:28100731372/4/1727783/6
/173/6/1715:16100732642/4/1727773/4/173/4/1715:0010073336
2/5/1727793/5/173/5/1717:20100734382/5/1727823/6/173/6/171
3:14100735682/5/1727833/4/173/4/1717:59100736382/5/172785
3/4/173/4/1712:0610073782/5/1727813/7/173/7/179:101007382
62/5/1727863/4/173/4/178:2910073952/5/1727803/7/173/7/1717
:10100740392/5/1727843/7/173/7/177:45100741402/6/1727873/
7/173/7/1710:24100742692/6/1727883/6/173/6/1712:591007432
12/7/1727913/7/173/7/178:11100744212/7/1727923/9/173/9/171
6:44100745152/7/1727903/7/173/7/1710:18100746472/7/172789
3/6/173/6/1711:10100747352/8/1727933/9/173/9/178:30100748
102/8/1727943/10/173/10/1710:02100749302/8/1727963/9/173/
9/1717:42100750222/8/1727953/7/173/7/1713:01100751402/9/1
728023/8/173/8/1717:5910075262/9/1728013/8/173/8/1710:451
00753312/9/1727983/10/173/10/1713:0010075442/9/1728003/8/
173/8/1714:33100755492/9/1727993/11/173/11/1712:201007564
12/9/1727973/8/173/8/1715:15100757192/10/1728033/10/173/1
0/1717:46100758432/10/1728043/10/173/10/1710:49100759712/
11/1728063/13/173/13/179:26100760432/11/1728053/12/173/12
/1714:2310076162/12/1728083/11/173/11/1713:36100762722/12
/1728093/13/173/13/177:3110076332/12/1728103/13/173/13/17
15:27100764412/12/1728073/12/173/12/1715:22100765132/14/1
728113/14/173/14/1710:18100766282/14/1728123/15/173/15/17
14:18100767112/15/1728163/15/173/15/179:55100768442/15/17
28133/16/173/16/178:21100769452/15/1728143/14/173/14/1712
:59100770692/15/1728153/14/173/14/1711:07100771572/16/172
8203/16/173/16/1716:2610077262/16/1728183/15/173/15/1712:
07100773542/16/1728223/17/173/17/1716:18100774222/16/172
8213/15/173/15/1710:32100775442/16/1728193/16/173/16/1713
:11100776462/16/1728173/16/173/16/1715:37100777112/19/172
8233/18/173/18/1712:55100778102/19/1728243/21/173/21/1712
:47100779202/21/1728283/22/173/22/178:24100780552/21/1728
273/20/173/20/1711:4610078192/21/1728253/22/173/22/1713:3
7100782702/21/1728263/21/173/21/178:01100783362/24/17283
03/25/173/25/1714:16100784422/24/1728293/26/173/26/1710:3
1100785362/25/1728363/27/173/27/1714:46100786712/25/1728
343/24/173/24/1715:36100787272/25/1728333/24/173/24/1715:
4310078822/25/1728323/25/173/25/1710:20100789242/25/1728
313/26/173/26/1717:40100790422/25/1728353/26/173/26/1715:
09100791123/1/1728393/31/173/31/179:13100792433/1/172840
3/30/173/30/179:43100793313/1/1728423/29/173/29/1715:4610
079493/1/1728413/30/173/30/1713:22100795303/1/1728373/31/
173/31/1712:52100796413/1/1728383/29/173/29/1711:30100797
513/2/1728443/31/173/31/1710:11100798573/2/1728453/31/173
/31/1715:14100799133/2/1728463/29/173/29/1715:21100800243
/2/1728434/1/174/1/1714:03100801123/5/1728504/1/174/1/1717
:59100802433/5/1728484/1/174/1/178:43100803723/5/1728474/
4/174/4/177:38100804443/5/1728544/3/174/3/1711:3310080549
3/5/1728534/2/174/2/1715:16100806263/5/1728514/2/174/2/171
5:45100807343/5/1728524/4/174/4/1713:10100808613/5/172849
4/2/174/2/179:10100809523/6/1728574/3/174/3/177:461008103
03/6/1728554/2/174/2/1713:33100811203/6/1728564/4/174/4/17
14:4210081223/6/1728584/3/174/3/1714:26100813653/7/172862
4/6/174/6/179:4410081483/7/1728594/3/174/3/177:4610081547
3/7/1728604/6/174/6/1716:07100816603/7/1728614/5/174/5/171
5:44100817133/10/1728634/9/174/9/1715:02100818483/10/1728
654/7/174/7/1710:17100819183/10/1728664/8/174/8/178:19100
820723/10/1728644/7/174/7/1715:31100821233/11/1728684/7/1
74/7/1710:57100822253/11/1728674/7/174/7/1716:23100823543
/12/1728694/8/174/8/1712:14100824353/12/1728704/8/174/8/17
15:37100825123/13/1728724/10/174/10/1714:35100826233/13/1
728734/9/174/9/177:52100827733/13/1728774/10/174/10/1716:
51100828123/13/1728764/10/174/10/1715:29100829373/13/172
8744/12/174/12/1710:3710083043/13/1728714/10/174/10/1712:
52100831723/13/1728784/10/174/10/178:18100832643/13/1728
754/12/174/12/1714:59100833143/14/1728824/12/174/12/1710:
26100834563/14/1728804/13/174/13/1710:35100835303/14/172
8834/11/174/11/1712:51100836443/14/1728794/10/174/10/1712
:33100837103/14/1728864/11/174/11/1717:57100838453/14/172
8814/13/174/13/1712:22100839413/14/1728844/11/174/11/179:
08100840343/14/1728854/10/174/10/1711:41100841233/15/172
8914/13/174/13/1710:59100842373/15/1728874/13/174/13/179:
17100843443/15/1728904/12/174/12/1714:30100844723/15/172
8884/13/174/13/1712:58100845493/15/1728894/14/174/14/1713
:35100846463/15/1728924/13/174/13/177:58100847353/17/1728
964/16/174/16/179:04100848223/17/1728934/15/174/15/1714:3
9100849503/17/1728944/15/174/15/1712:09100850643/17/1728
954/16/174/16/1714:33100851573/18/1728974/16/174/16/177:5
7100852133/18/1728984/14/174/14/1713:20100853263/19/1728
994/16/174/16/179:12100854263/19/1729004/15/174/15/1712:3
7100855363/20/1729024/18/174/18/179:54100856313/20/17290
14/16/174/16/179:47100857243/20/1729034/17/174/17/1717:46
100858623/20/1729044/19/174/19/177:45100859593/21/172905
4/18/174/18/1717:16100860393/21/1729064/18/174/18/179:081
00861353/22/1729104/18/174/18/1715:3010086213/22/1729114/
20/174/20/1713:04100863313/22/1729094/18/174/18/177:43100
864303/22/1729084/19/174/19/1710:59100865463/22/1729124/2
0/174/20/179:10100866533/22/1729074/18/174/18/1713:441008
67153/24/1729164/22/174/22/1711:57100868433/24/1729174/20
/174/20/1710:35100869373/24/1729154/23/174/23/178:5410087
023/24/1729144/20/174/20/1710:11100871173/24/1729184/20/1
74/20/1711:0010087253/24/1729134/23/174/23/178:3510087324
3/25/1729194/22/174/22/1712:5210087423/25/1729204/24/174/
24/179:0910087523/25/1729214/23/174/23/179:47100876263/25
/1729224/23/174/23/178:12100877673/26/1729234/25/174/25/1
717:1210087853/26/1729244/24/174/24/1716:46100879253/27/1
729254/25/174/25/1710:06100880173/27/1729264/24/174/24/17
12:08100881123/28/1729304/25/174/25/1710:40100882673/28/1
729274/27/174/27/1717:45100883373/28/1729284/24/174/24/17
8:0910088443/28/1729294/26/174/26/1717:03100885673/29/172
9314/27/174/27/177:38100886553/29/1729324/25/174/25/1711:
43100887513/30/1729334/29/174/29/1717:53100888383/30/172
9344/27/174/27/1712:24100889253/31/1729364/28/174/28/1716
:01100890173/31/1729354/27/174/27/1714:54100891184/1/1729
424/28/174/28/178:46100892144/1/1729414/29/174/29/178:571
00893154/1/1729444/29/174/29/1716:23100894524/1/1729374/3
0/174/30/1714:27100895544/1/1729394/28/174/28/1710:431008
96544/1/1729385/1/175/1/1710:12100897104/1/1729404/29/174
/29/1710:02100898394/1/1729434/29/174/29/178:09100899654/
2/1729485/2/175/2/1717:07100900464/2/1729464/29/174/29/17
12:25100901164/2/1729455/1/175/1/1712:5910090234/2/172947
4/30/174/30/178:08100903214/4/1729505/2/175/2/1710:251009
04584/4/1729495/3/175/3/179:40100905424/4/1729515/1/175/1/
1710:2310090634/4/1729525/4/175/4/1712:22100907174/5/1729
535/5/175/5/1717:01100908604/5/1729545/5/175/5/1711:02100
909364/6/1729585/5/175/5/1711:35100910634/6/1729555/4/175
/4/178:06100911514/6/1729605/4/175/4/177:30100912144/6/17
29575/3/175/3/1712:31100913434/6/1729595/5/175/5/1712:561
00914244/6/1729565/4/175/4/1712:33100915564/7/1729615/4/1
75/4/178:04100916374/7/1729625/6/175/6/1710:48100917564/8
/1729635/8/175/8/1715:01100918164/8/1729645/5/175/5/177:34
100919374/10/1729675/8/175/8/1711:50100920224/10/1729685/
8/175/8/1716:1910092144/10/1729705/9/175/9/1714:471009226
94/10/1729655/7/175/7/1716:4610092334/10/1729695/7/175/7/1
711:12100924504/10/1729665/8/175/8/1712:45100925404/12/17
29735/12/175/12/1712:43100926384/12/1729745/11/175/11/171
2:48100927664/12/1729725/11/175/11/1714:01100928664/12/17
29715/11/175/11/1717:34100929184/13/1729765/11/175/11/178
:1810093054/13/1729755/10/175/10/1717:52100931654/14/1729
775/13/175/13/1714:2810093214/14/1729795/11/175/11/1717:3
210093384/14/1729785/13/175/13/1715:0610093414/14/172980
5/13/175/13/1715:33100935714/15/1729825/15/175/15/1714:41
10093664/15/1729815/15/175/15/1712:41100937564/16/172986
5/14/175/14/1716:02100938274/16/1729845/15/175/15/1712:13
100939264/16/1729855/16/175/16/1711:31100940394/16/17298
35/13/175/13/1713:2610094174/17/1729885/17/175/17/1714:23
100942734/17/1729915/17/175/17/1713:34100943154/17/17299
05/16/175/16/179:56100944194/17/1729875/15/175/15/178:341
00945174/17/1729895/14/175/14/1711:24100946314/17/172992
5/17/175/17/1717:17100947664/20/1729935/18/175/18/178:081
0094834/20/1729945/20/175/20/178:42100949404/21/1729975/1
8/175/18/1710:3810095084/21/1729955/20/175/20/1716:201009
51494/21/1729985/18/175/18/1714:13100952644/21/1729965/20
/175/20/1716:03100953134/22/1729995/19/175/19/1716:551009
54704/22/1730005/21/175/21/1712:29100955184/25/1730035/22
/175/22/1717:03100956144/25/1730065/22/175/22/1717:311009
57724/25/1730045/22/175/22/179:01100958204/25/1730055/25/
175/25/177:59100959624/25/1730025/24/175/24/178:341009603
24/25/1730015/22/175/22/179:39100961404/26/1730095/24/175
/24/179:01100962654/26/1730105/26/175/26/1712:02100963374
/26/1730085/25/175/25/1714:41100964164/26/1730075/26/175/
26/178:11100965484/27/1730155/27/175/27/1711:07100966524/
27/1730125/25/175/25/179:44100967524/27/1730165/25/175/25
/1710:2710096894/27/1730145/27/175/27/1711:36100969494/27
/1730115/24/175/24/1713:48100970534/27/1730135/26/175/26/
179:12100971154/28/1730215/25/175/25/1714:29100972184/28/
1730195/28/175/28/1711:05100973424/28/1730225/28/175/28/1
713:59100974464/28/1730185/27/175/27/1711:49100975534/28/
1730205/26/175/26/177:34100976414/28/1730175/26/175/26/17
15:38100977194/29/1730245/28/175/28/1714:28100978444/29/1
730235/27/175/27/1717:26100979515/1/1730265/28/175/28/171
3:51100980285/1/1730255/28/175/28/1712:06100981255/2/1730
275/30/175/30/1712:48100982105/2/1730305/29/175/29/1710:5
5100983205/2/1730296/1/176/1/1714:26100984165/2/1730285/3
1/175/31/1716:48100985365/4/1730346/1/176/1/177:361009862
95/4/1730336/2/176/2/1715:40100987565/4/1730325/31/175/31/
1716:30100988545/4/1730316/3/176/3/1717:15100989225/4/173
0356/3/176/3/1717:12100990425/4/1730366/2/176/2/1716:3410
099185/5/1730406/4/176/4/1715:16100992475/5/1730376/1/176
/1/1711:51100993225/5/1730396/1/176/1/1716:07100994395/5/
1730386/1/176/1/1712:40100995215/6/1730426/3/176/3/179:10
100996245/6/1730416/2/176/2/1711:21100997235/8/1730446/5/
176/5/1711:11100998435/8/1730456/6/176/6/177:44100999175/
8/1730466/7/176/7/1717:0210100055/8/1730436/4/176/4/1710:1
7101001125/9/1730516/5/176/5/179:47101002385/9/1730526/8/
176/8/1716:23101003485/9/1730496/8/176/8/1712:50101004145
/9/1730536/8/176/8/1713:24101005175/9/1730486/6/176/6/1717
:16101006555/9/1730546/5/176/5/1716:47101007695/9/1730476
/7/176/7/1710:48101008705/9/1730506/6/176/6/1714:35101009
135/10/1730566/6/176/6/178:2310101095/10/1730556/9/176/9/1
711:59101011195/11/1730586/10/176/10/1710:31101012425/11/
1730576/7/176/7/1710:03101013385/12/1730596/9/176/9/1715:
48101014135/12/1730616/8/176/8/1713:14101015735/12/17306
46/9/176/9/1717:49101016445/12/1730606/8/176/8/1710:27101
017225/12/1730626/10/176/10/1710:41101018225/12/1730636/8
/176/8/1717:48101019405/13/1730666/12/176/12/179:39101020
565/13/1730676/9/176/9/1716:54101021115/13/1730656/10/176
/10/1715:29101022695/13/1730686/11/176/11/1717:5810102313
5/14/1730696/11/176/11/1710:37101024205/14/1730726/11/176
/11/179:20101025705/14/1730706/12/176/12/1715:5610102635/
14/1730716/10/176/10/1712:37101027515/15/1730786/14/176/1
4/1712:43101028215/15/1730736/13/176/13/1717:35101029585/
15/1730746/11/176/11/1717:42101030445/15/1730756/11/176/1
1/1710:17101031205/15/1730806/12/176/12/1715:06101032725/
15/1730766/11/176/11/1712:10101033325/15/1730776/11/176/1
1/178:51101034425/15/1730796/12/176/12/1716:29101035125/1
7/1730826/13/176/13/1710:43101036575/17/1730836/13/176/13
/1712:22101037455/17/1730846/15/176/15/1713:39101038285/1
7/1730816/14/176/14/1710:13101039235/18/1730856/17/176/17
/1716:47101040185/18/1730866/17/176/17/1714:27101041115/1
8/1730876/14/176/14/1714:02101042155/18/1730886/15/176/15
/1710:20101043385/20/1730896/16/176/16/1716:02101044455/2
0/1730906/17/176/17/1713:32101045125/21/1730946/18/176/18
/1713:3810104615/21/1730916/19/176/19/1714:01101047555/21
/1730936/19/176/19/1713:13101048245/21/1730926/19/176/19/
1710:20101049195/22/1730986/21/176/21/178:5210105015/22/1
730976/21/176/21/177:38101051625/22/1730956/21/176/21/171
6:3410105255/22/1730966/19/176/19/1714:01101053385/24/173
1006/22/176/22/1716:29101054565/24/1730996/21/176/21/1710
:59101055275/24/1731026/22/176/22/178:53101056485/24/1731
016/22/176/22/1715:36101057435/25/1731036/24/176/24/1716:
38101058525/25/1731046/21/176/21/1712:31101059265/25/173
1056/24/176/24/1716:43101060705/25/1731066/21/176/21/1714
:51101061525/27/1731086/26/176/26/1716:11101062505/27/173
1076/23/176/23/178:49101063505/27/1731106/24/176/24/178:3
8101064415/27/1731096/25/176/25/1711:18101065405/28/1731
126/24/176/24/1714:2110106665/28/1731116/26/176/26/1717:2
0101067215/29/1731146/25/176/25/1717:15101068675/29/1731
136/28/176/28/1710:19101069235/31/1731156/28/176/28/1711:
42101070285/31/1731166/30/176/30/1711:45101071256/1/1731
206/28/176/28/1711:4110107286/1/1731196/28/176/28/178:441
01073146/1/1731176/28/176/28/1715:49101074316/1/1731187/1
/177/1/179:46101075446/1/1731216/28/176/28/1710:381010762
86/1/1731226/29/176/29/178:32101077126/2/1731267/2/177/2/1
710:37101078366/2/1731246/30/176/30/1710:47101079136/2/17
31287/2/177/2/1715:20101080136/2/1731256/30/176/30/179:31
101081196/2/1731297/2/177/2/1712:11101082696/2/1731307/2/
177/2/1714:43101083606/2/1731277/2/177/2/1710:21101084506
/2/1731237/1/177/1/1710:19101085516/3/1731327/3/177/3/178:
07101086196/3/1731337/2/177/2/1716:30101087496/3/1731347/
2/177/2/1711:50101088506/3/1731317/3/177/3/1712:491010896
86/5/1731417/5/177/5/1716:28101090186/5/1731387/5/177/5/17
12:1510109186/5/1731427/2/177/2/1714:11101092586/5/173139
7/3/177/3/1712:37101093596/5/1731367/5/177/5/1712:5410109
4206/5/1731407/3/177/3/178:08101095266/5/1731447/4/177/4/1
710:20101096456/5/1731357/2/177/2/1717:44101097456/5/1731
437/5/177/5/1710:06101098326/5/1731377/3/177/3/179:251010
99666/6/1731487/6/177/6/1715:18101100246/6/1731457/5/177/
5/1710:49101101496/6/1731477/4/177/4/1710:06101102456/6/1
731467/4/177/4/1711:32101103686/7/1731507/7/177/7/1717:46
101104206/7/1731497/4/177/4/1711:11101105566/8/1731537/6/
177/6/1715:01101106306/8/1731547/5/177/5/1714:09101107246
/8/1731517/8/177/8/1717:34101108506/8/1731527/5/177/5/1710
:50101109386/9/1731587/9/177/9/1716:17101110146/9/1731577
/7/177/7/1713:20101111226/9/1731557/6/177/6/1716:59101112
226/9/1731567/7/177/7/178:55101113656/10/1731627/9/177/9/1
711:42101114576/10/1731607/8/177/8/1710:21101115566/10/17
31617/7/177/7/1716:18101116676/10/1731597/10/177/10/1713:
50101117236/12/1731677/9/177/9/1716:27101118146/12/17316
57/10/177/10/178:06101119276/12/1731667/11/177/11/1712:46
101120476/12/1731637/10/177/10/1714:28101121456/12/17316
47/12/177/12/1710:40101122416/12/1731687/10/177/10/1713:4
2101123296/13/1731707/13/177/13/1710:22101124356/13/1731
697/10/177/10/177:55101125526/14/1731737/13/177/13/177:34
101126206/14/1731747/11/177/11/1716:34101127726/14/17317
27/14/177/14/179:49101128286/14/1731717/11/177/11/1716:15
10112976/16/1731767/15/177/15/1715:34101130656/16/173177
7/14/177/14/1713:44101131156/16/1731787/13/177/13/179:501
01132246/16/1731757/14/177/14/1711:50101133626/16/173180
7/16/177/16/1713:31101134466/16/1731797/14/177/14/1711:16
101135716/18/1731827/15/177/15/1716:41101136586/18/17318
47/18/177/18/1714:14101137176/18/1731837/16/177/16/177:59
101138166/18/1731817/16/177/16/177:51101139146/20/173186
7/19/177/19/1714:40101140226/20/1731857/20/177/20/1712:53
101141236/21/1731907/20/177/20/1713:00101142596/21/17318
77/19/177/19/177:58101143186/21/1731897/18/177/18/178:451
0114496/21/1731887/20/177/20/1712:25101145156/22/1731947/
21/177/21/178:30101146276/22/1731917/22/177/22/1714:45101
14726/22/1731977/22/177/22/179:15101148606/22/1731967/19/
177/19/177:59101149606/22/1731937/22/177/22/1715:16101150
616/22/1731987/21/177/21/1716:49101151166/22/1731957/20/1
77/20/1714:00101152286/22/1731927/19/177/19/1713:20101153
46/24/1732027/23/177/23/1711:12101154176/24/1732007/22/17
7/22/1710:40101155606/24/1731997/21/177/21/1715:311011562
86/24/1732017/23/177/23/1717:35101157336/25/1732067/23/17
7/23/1716:05101158716/25/1732047/25/177/25/1716:181011591
26/25/1732077/25/177/25/1716:01101160656/25/1732037/25/17
7/25/1715:32101161196/25/1732087/22/177/22/1715:291011625
06/25/1732057/25/177/25/1713:14101163316/26/1732107/23/17
7/23/179:56101164476/26/1732097/26/177/26/179:40101165656
/27/1732137/24/177/24/1711:00101166296/27/1732127/24/177/
24/1714:04101167676/27/1732117/26/177/26/1710:2010116816/
27/1732147/25/177/25/178:55101169126/29/1732177/29/177/29
/178:20101170186/29/1732157/29/177/29/1715:46101171476/29
/1732187/26/177/26/178:49101172616/29/1732167/29/177/29/1
710:21101173516/30/1732197/29/177/29/179:31101174636/30/1
732207/29/177/29/1710:03101175156/30/1732217/28/177/28/17
14:3310117626/30/1732227/27/177/27/1714:12101177657/1/173
2247/29/177/29/1712:35101178337/1/1732257/29/177/29/1712:
26101179187/1/1732237/29/177/29/1716:16101180487/1/17322
67/29/177/29/178:26101181407/3/1732277/31/177/31/1714:571
0118217/3/1732308/1/178/1/1710:09101183477/3/1732328/1/17
8/1/179:36101184507/3/1732298/2/178/2/1717:0010118557/3/1
732318/2/178/2/1716:4610118657/3/1732287/30/177/30/1711:0
0101187197/4/1732378/3/178/3/1717:13101188197/4/1732348/1
/178/1/177:30101189197/4/1732388/3/178/3/1711:48101190307
/4/1732369/9/997/4/1714:38101191307/4/1732338/1/178/1/1712
:57101192647/4/1732358/2/178/2/1716:37101193577/6/1732408
/3/178/3/1712:20101194737/6/1732398/3/178/3/1712:53101195
397/9/1732428/6/178/6/178:3510119637/9/1732419/9/997/9/171
4:3410119717/10/1732438/8/178/8/1710:02101198207/10/17324
48/7/178/7/1713:1610119977/11/1732488/8/178/8/1717:241012
00207/11/1732478/8/178/8/177:32101201477/11/1732468/7/178
/7/1715:52101202707/11/1732458/7/178/7/1716:59101203717/1
2/1732498/9/178/9/1712:53101204167/12/1732508/8/178/8/171
6:11101205217/13/1732528/11/178/11/1715:26101206677/13/17
32538/12/178/12/1712:50101207497/13/1732548/12/178/12/171
6:3910120837/13/1732518/12/178/12/1713:53101209447/14/173
2558/10/178/10/1715:22101210617/14/1732568/13/178/13/1715
:39101211567/15/1732578/11/178/11/1710:27101212317/15/173
2588/13/178/13/1715:57101213637/16/1732599/10/179/10/1713
:23101214327/16/1732608/12/178/12/1714:11101215717/18/173
2638/14/178/14/1712:49101216677/18/1732628/14/178/14/1715
:46101217277/18/1732648/14/178/14/1717:25101218347/18/173
2618/14/178/14/1717:32101219417/18/1732668/16/178/16/1714
:4410122057/18/1732658/16/178/16/1713:01101221297/20/1732
678/16/178/16/179:10101222147/20/1732698/16/178/16/1713:5
9101223147/20/1732708/17/178/17/1714:59101224627/20/1732
688/18/178/18/178:46101225637/21/1732729/10/179/10/179:14
101226697/21/1732718/18/178/18/1710:1410122767/23/173274
8/19/178/19/178:42101228597/23/1732738/21/178/21/1714:521
01229337/24/1732758/20/178/20/178:13101230377/24/1732788/
21/178/21/1717:00101231487/24/1732808/21/178/21/178:08101
232227/24/1732798/22/178/22/1714:0710123347/24/1732768/22
/178/22/179:44101234227/24/1732778/22/178/22/1713:3410123
5507/26/1732828/23/178/23/179:2810123657/26/1732818/25/17
8/25/1710:41101237517/27/1732868/25/178/25/1713:471012384
87/27/1732888/23/178/23/177:52101239567/27/1732858/23/178
/23/1710:24101240647/27/1732838/24/178/24/1710:4910124141
7/27/1732878/25/178/25/1717:40101242347/27/1732848/23/178
/23/1712:30101243637/28/1732899/10/179/10/1717:4510124466
7/28/1732918/25/178/25/178:13101245197/28/1732908/27/178/
27/1713:25101246697/28/1732928/27/178/27/1714:3410124740
7/30/1732948/27/178/27/178:15101248377/30/1732938/27/178/
27/1714:53101249637/31/1732959/10/179/10/1715:5710125034
7/31/1732968/30/178/30/1714:35101251338/1/1732988/30/178/
30/1714:4510125228/1/1732978/31/178/31/1715:37101253618/1
/1732998/31/178/31/179:45101254468/1/1733008/28/178/28/17
9:02101255538/2/1733018/29/178/29/177:59101256348/2/17330
28/30/178/30/1714:55101257338/3/1733048/30/178/30/1711:20
101258568/3/1733079/2/179/2/1714:46101259108/3/1733089/1/
179/1/1711:1410126098/3/1733038/30/178/30/177:49101261228
/3/1733068/30/178/30/1713:51101262268/3/1733058/30/178/30/
1717:11101263238/4/1733099/3/179/3/1715:12101264588/4/173
3109/2/179/2/1710:40101265198/5/1733129/3/179/3/178:34101
266448/5/1733169/2/179/2/1713:19101267498/5/1733139/3/179
/3/1714:32101268608/5/1733149/2/179/2/1710:54101269508/5/
1733159/3/179/3/1714:53101270648/5/1733119/2/179/2/1713:4
7101271368/7/1733219/3/179/3/178:46101272528/7/1733189/3/
179/3/1717:51101273228/7/1733229/5/179/5/1716:05101274468
/7/1733209/6/179/6/1717:45101275348/7/1733199/5/179/5/1712
:00101276618/7/1733179/3/179/3/1717:33101277658/8/1733269
/4/179/4/178:39101278358/8/1733259/6/179/6/178:0510127928
8/8/1733239/4/179/4/1711:1410128038/8/1733249/4/179/4/177:
42101281258/9/1733309/5/179/5/1717:57101282388/9/1733319/
5/179/5/179:0210128368/9/1733279/8/179/8/1716:29101284378
/9/1733289/5/179/5/1714:28101285168/9/1733299/8/179/8/178:
39101286648/9/1733329/5/179/5/1714:13101287138/10/173333
9/6/179/6/178:16101288438/10/1733349/9/179/9/1714:4810128
9138/11/1733359/9/179/9/1712:57101290368/11/1733379/10/17
9/10/1713:14101291378/11/1733389/10/179/10/178:5610129262
8/11/1733369/10/179/10/1714:02101293148/12/1733399/10/179
/10/1717:22101294608/12/1733409/11/179/11/178:08101295388
/13/1733429/10/179/10/1710:17101296448/13/1733419/9/179/9/
1715:3110129778/14/1733439/12/179/12/1716:42101298198/14/
1733469/13/179/13/1716:51101299148/14/1733459/12/179/12/1
710:05101300508/14/1733449/13/179/13/1710:32101301568/15/
1733479/14/179/14/1711:00101302428/15/1733489/13/179/13/1
714:0910130378/17/1733499/15/179/15/178:33101304268/17/17
33509/16/179/16/178:52101305658/18/1733539/14/179/14/178:
04101306678/18/1733529/17/179/17/1715:47101307158/18/173
3549/15/179/15/178:52101308178/18/1733519/16/179/16/1710:
31101309218/19/1733609/17/179/17/1717:15101310658/19/173
3589/16/179/16/1713:37101311278/19/1733559/18/179/18/1712
:32101312488/19/1733569/15/179/15/1717:03101313488/19/173
3579/15/179/15/178:13101314618/19/1733599/16/179/16/1714:
16101315658/20/1733689/17/179/17/178:59101316258/20/1733
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx

More Related Content

Similar to Access Control, Authentication, and Public Key Infrastructure .docx

Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Decisions
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Running Head LAB 51LAB 57Lab 5.docx
Running Head  LAB 51LAB 57Lab 5.docxRunning Head  LAB 51LAB 57Lab 5.docx
Running Head LAB 51LAB 57Lab 5.docxtoddr4
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementIvanti
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured WorldJennifer Mary
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51martinvoelk
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?Rapid7
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamenskamensm02
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTuan Phan
 
Running Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docxRunning Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docxtodd581
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxmastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxsarah david
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?ONE BCG
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWinfosec train
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfElanusTechnologies
 
Digitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalStakeout
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdfmastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdfsarah david
 

Similar to Access Control, Authentication, and Public Key Infrastructure .docx (20)

Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Running Head LAB 51LAB 57Lab 5.docx
Running Head  LAB 51LAB 57Lab 5.docxRunning Head  LAB 51LAB 57Lab 5.docx
Running Head LAB 51LAB 57Lab 5.docx
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
 
TrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability ManagementTrustedAgent GRC for Vulnerability Management
TrustedAgent GRC for Vulnerability Management
 
Running Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docxRunning Head PROJECT CHARTS1PROJECT CHARTS2.docx
Running Head PROJECT CHARTS1PROJECT CHARTS2.docx
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxmastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?
 
CISA (1).pdf
CISA (1).pdfCISA (1).pdf
CISA (1).pdf
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
Digitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalstakeout Scout Overview
Digitalstakeout Scout Overview
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdfmastering_web_testing_how_to_make_the_most_of_frameworks.pdf
mastering_web_testing_how_to_make_the_most_of_frameworks.pdf
 

More from daniahendric

Variables in a Research Study and Data CollectionIn this assignmen.docx
Variables in a Research Study and Data CollectionIn this assignmen.docxVariables in a Research Study and Data CollectionIn this assignmen.docx
Variables in a Research Study and Data CollectionIn this assignmen.docxdaniahendric
 
Variation exists in virtually all parts of our lives. We often see v.docx
Variation exists in virtually all parts of our lives. We often see v.docxVariation exists in virtually all parts of our lives. We often see v.docx
Variation exists in virtually all parts of our lives. We often see v.docxdaniahendric
 
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docx
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docxValerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docx
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docxdaniahendric
 
valerie is a 15 year old girl who has recently had signs of a high f.docx
valerie is a 15 year old girl who has recently had signs of a high f.docxvalerie is a 15 year old girl who has recently had signs of a high f.docx
valerie is a 15 year old girl who has recently had signs of a high f.docxdaniahendric
 
Utilizing the Statement of Financial Position on page 196 of the Acc.docx
Utilizing the Statement of Financial Position on page 196 of the Acc.docxUtilizing the Statement of Financial Position on page 196 of the Acc.docx
Utilizing the Statement of Financial Position on page 196 of the Acc.docxdaniahendric
 
Utech Company has income before irregular items of $307,500 for the .docx
Utech Company has income before irregular items of $307,500 for the .docxUtech Company has income before irregular items of $307,500 for the .docx
Utech Company has income before irregular items of $307,500 for the .docxdaniahendric
 
Using your work experience in the public and nonprofit sector, and t.docx
Using your work experience in the public and nonprofit sector, and t.docxUsing your work experience in the public and nonprofit sector, and t.docx
Using your work experience in the public and nonprofit sector, and t.docxdaniahendric
 
Using your textbook, provide a detailed and specific definition to.docx
Using your textbook, provide a detailed and specific definition to.docxUsing your textbook, provide a detailed and specific definition to.docx
Using your textbook, provide a detailed and specific definition to.docxdaniahendric
 
Using your text and at least one scholarly source, prepare a two to .docx
Using your text and at least one scholarly source, prepare a two to .docxUsing your text and at least one scholarly source, prepare a two to .docx
Using your text and at least one scholarly source, prepare a two to .docxdaniahendric
 
Using Walgreen Company as the target organization complete the.docx
Using Walgreen Company as the target organization complete the.docxUsing Walgreen Company as the target organization complete the.docx
Using Walgreen Company as the target organization complete the.docxdaniahendric
 
Using the text book and power point on Interest Groups, please ans.docx
Using the text book and power point on Interest Groups, please ans.docxUsing the text book and power point on Interest Groups, please ans.docx
Using the text book and power point on Interest Groups, please ans.docxdaniahendric
 
Using the template provided in attachment create your own layout.R.docx
Using the template provided in attachment create your own layout.R.docxUsing the template provided in attachment create your own layout.R.docx
Using the template provided in attachment create your own layout.R.docxdaniahendric
 
Using the simplified OOD methodologyWrite down a detailed descrip.docx
Using the simplified OOD methodologyWrite down a detailed descrip.docxUsing the simplified OOD methodologyWrite down a detailed descrip.docx
Using the simplified OOD methodologyWrite down a detailed descrip.docxdaniahendric
 
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docx
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docxUsing the text, Cognitive Psychology 5 edition (Galotti, 2014), .docx
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docxdaniahendric
 
Using the Tana Basin in Kenya,1.Discuss the water sources and .docx
Using the Tana Basin in Kenya,1.Discuss the water sources and .docxUsing the Tana Basin in Kenya,1.Discuss the water sources and .docx
Using the Tana Basin in Kenya,1.Discuss the water sources and .docxdaniahendric
 
Using the template provided in a separate file, create your own la.docx
Using the template provided in a separate file, create your own la.docxUsing the template provided in a separate file, create your own la.docx
Using the template provided in a separate file, create your own la.docxdaniahendric
 
Using the template provided in attachment create your own layo.docx
Using the template provided in attachment create your own layo.docxUsing the template provided in attachment create your own layo.docx
Using the template provided in attachment create your own layo.docxdaniahendric
 
Using the Sex(abled) video, the sexuality section in the Falvo text.docx
Using the Sex(abled) video, the sexuality section in the Falvo text.docxUsing the Sex(abled) video, the sexuality section in the Falvo text.docx
Using the Sex(abled) video, the sexuality section in the Falvo text.docxdaniahendric
 
Using the required and recommended resources from this week and last.docx
Using the required and recommended resources from this week and last.docxUsing the required and recommended resources from this week and last.docx
Using the required and recommended resources from this week and last.docxdaniahendric
 
Using the Internet, textbook or related resources, research the crea.docx
Using the Internet, textbook or related resources, research the crea.docxUsing the Internet, textbook or related resources, research the crea.docx
Using the Internet, textbook or related resources, research the crea.docxdaniahendric
 

More from daniahendric (20)

Variables in a Research Study and Data CollectionIn this assignmen.docx
Variables in a Research Study and Data CollectionIn this assignmen.docxVariables in a Research Study and Data CollectionIn this assignmen.docx
Variables in a Research Study and Data CollectionIn this assignmen.docx
 
Variation exists in virtually all parts of our lives. We often see v.docx
Variation exists in virtually all parts of our lives. We often see v.docxVariation exists in virtually all parts of our lives. We often see v.docx
Variation exists in virtually all parts of our lives. We often see v.docx
 
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docx
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docxValerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docx
Valerie Matsumotos Desperately Seeking Deirde  Gender Roles, Mu.docx
 
valerie is a 15 year old girl who has recently had signs of a high f.docx
valerie is a 15 year old girl who has recently had signs of a high f.docxvalerie is a 15 year old girl who has recently had signs of a high f.docx
valerie is a 15 year old girl who has recently had signs of a high f.docx
 
Utilizing the Statement of Financial Position on page 196 of the Acc.docx
Utilizing the Statement of Financial Position on page 196 of the Acc.docxUtilizing the Statement of Financial Position on page 196 of the Acc.docx
Utilizing the Statement of Financial Position on page 196 of the Acc.docx
 
Utech Company has income before irregular items of $307,500 for the .docx
Utech Company has income before irregular items of $307,500 for the .docxUtech Company has income before irregular items of $307,500 for the .docx
Utech Company has income before irregular items of $307,500 for the .docx
 
Using your work experience in the public and nonprofit sector, and t.docx
Using your work experience in the public and nonprofit sector, and t.docxUsing your work experience in the public and nonprofit sector, and t.docx
Using your work experience in the public and nonprofit sector, and t.docx
 
Using your textbook, provide a detailed and specific definition to.docx
Using your textbook, provide a detailed and specific definition to.docxUsing your textbook, provide a detailed and specific definition to.docx
Using your textbook, provide a detailed and specific definition to.docx
 
Using your text and at least one scholarly source, prepare a two to .docx
Using your text and at least one scholarly source, prepare a two to .docxUsing your text and at least one scholarly source, prepare a two to .docx
Using your text and at least one scholarly source, prepare a two to .docx
 
Using Walgreen Company as the target organization complete the.docx
Using Walgreen Company as the target organization complete the.docxUsing Walgreen Company as the target organization complete the.docx
Using Walgreen Company as the target organization complete the.docx
 
Using the text book and power point on Interest Groups, please ans.docx
Using the text book and power point on Interest Groups, please ans.docxUsing the text book and power point on Interest Groups, please ans.docx
Using the text book and power point on Interest Groups, please ans.docx
 
Using the template provided in attachment create your own layout.R.docx
Using the template provided in attachment create your own layout.R.docxUsing the template provided in attachment create your own layout.R.docx
Using the template provided in attachment create your own layout.R.docx
 
Using the simplified OOD methodologyWrite down a detailed descrip.docx
Using the simplified OOD methodologyWrite down a detailed descrip.docxUsing the simplified OOD methodologyWrite down a detailed descrip.docx
Using the simplified OOD methodologyWrite down a detailed descrip.docx
 
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docx
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docxUsing the text, Cognitive Psychology 5 edition (Galotti, 2014), .docx
Using the text, Cognitive Psychology 5 edition (Galotti, 2014), .docx
 
Using the Tana Basin in Kenya,1.Discuss the water sources and .docx
Using the Tana Basin in Kenya,1.Discuss the water sources and .docxUsing the Tana Basin in Kenya,1.Discuss the water sources and .docx
Using the Tana Basin in Kenya,1.Discuss the water sources and .docx
 
Using the template provided in a separate file, create your own la.docx
Using the template provided in a separate file, create your own la.docxUsing the template provided in a separate file, create your own la.docx
Using the template provided in a separate file, create your own la.docx
 
Using the template provided in attachment create your own layo.docx
Using the template provided in attachment create your own layo.docxUsing the template provided in attachment create your own layo.docx
Using the template provided in attachment create your own layo.docx
 
Using the Sex(abled) video, the sexuality section in the Falvo text.docx
Using the Sex(abled) video, the sexuality section in the Falvo text.docxUsing the Sex(abled) video, the sexuality section in the Falvo text.docx
Using the Sex(abled) video, the sexuality section in the Falvo text.docx
 
Using the required and recommended resources from this week and last.docx
Using the required and recommended resources from this week and last.docxUsing the required and recommended resources from this week and last.docx
Using the required and recommended resources from this week and last.docx
 
Using the Internet, textbook or related resources, research the crea.docx
Using the Internet, textbook or related resources, research the crea.docxUsing the Internet, textbook or related resources, research the crea.docx
Using the Internet, textbook or related resources, research the crea.docx
 

Recently uploaded

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 

Recently uploaded (20)

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Access Control, Authentication, and Public Key Infrastructure .docx