Create an argument for additional regulation

Assignment Help Management Information Sys
Reference no: EM131376707

Assignment: Hacking the AIS

In today's technology environment, hackers present a substantial risk to a firm's accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.

For this assignment, research the Internet or Strayer databases and select a company whose database systems have been hacked.

Write a five to seven page paper in which you:

1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.

2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.

3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.

4. Provide at least three recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

o Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

o Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

o Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
o Use technology and information resources to research issues in accounting information systems.
o Write clearly and concisely about accounting information systems using proper writing mechanics

Reference no: EM131376707

Questions Cloud

Discus the implications of the empirical evidence : Calculate the return for each of these investments (capital gain/loss plus dividend). a)My portfolio ends the year with a value of $12.72 million after paying dividends at the end of the year tothe value of $255,000.
Identify how the activity enhances physical development : Physical development, especially in infancy and toddlerhood but also into middle/late childhood, is primarily focused on the development of fine and gross motor skills. But the milestones and activities for each age group are very different. For..
What are the economic implications : Would the answer change if more insurance plans covered the expensive treatment options? What are the economic implications if the facility absorbed the cost of the treatment
Role of data mining : Search for a relevant and/or timely article involving data mining. Describe the role of "data mining" in the story using your own words. Try to identify the type of data analysis method used (association, classification, cluster, outlier, etc.). (..
Create an argument for additional regulation : Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
Flowchart and pseudocode to turn : In this assignment you are to develop the logic to solve the following problem. Put your logic into a flowchart and pseudocode to turn in for a grade.
Do you think you ever take away your own sense of autonomy : Do you think you ever take away your own sense of autonomy? If so, how? Is this apparent when making decisions in your romantic relationships
Network to scale with the companies growth : When you design a network you keep in mind requirements concerning security, availability, recovery, and efficiency to name a few. How do you think you should design your network to scale with the companies growth? Where do VLAN's fit in?
Estimate the ratio of impact energy : For the tensile impact bar shown in Figure P7.20, estimate the ratio of impact energy that can be absorbed with and without the notch (which reduces the diameter to 24 mm) Assume that K = Ki = Kt.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What it recommendations would you make for john

Important information about IT Recommendations - What IT recommendations would you make for John?

  Explain a business process and give an example

Define a business process and give an example. Compare the book's methodology to the methodology you found in your research

  Systems planning development implementation what are

systems planning development implementation what are different types of designs?system design includes determining the

  Overcoming cultural differenceshow do cultural differences

overcoming cultural differenceshow do cultural differences affect projects? what technologies can be used to overcome

  Describe the open source software and how it works

In MS PowerPoint, create a presentation with slides that describe the open source software and how it works. Discuss the role this open source software has in management information systems.

  Explain the major privacy issues facing organizations today

Describe the major privacy issues facing organizations today. Analyze the major privacy issues described above and compare that to the potential privacy risks facing the sporting goods store.

  Should be risk-based and driven by business needs

Computer security is essentially a battle of wits between a perpetrator who tries to find holes and the administrator who tries to close them. Many security administrators view strong security as an impediment to efficient and user-friendly oper..

  Strategic managementi am currently looking for an outside

strategic managementi am currently looking for an outside opinion on a research project i have for pepsi cola. below

  Paper - faith-based decision making in business

Choose a social issue affecting the workplace and working environment, and develop a paper that thoroughly discusses the issue from both the workplace and societal viewpoints. Choose one of the following social issues: Faith-based decision making i..

  Produce a procurement management plan for the activities

Produce a procurement management plan for the activities that will be required within the project in which you: List the activities that will be outsourced, the skills / labor / material required, and the contract type

  Examine the various alternatives available

Using the Web, search for four (4) "software firewalls."  Examine the various alternatives available and compare their functionality, cost, features, and type of protection.  Create a weighted ranking according to your own evaluation of the features ..

  Evaluate technology trends available to market product

Evaluate technology trends available to market product in Canada for Walgreens - That and the introduction of newer products to Canada should bring in some business to Walgreens

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd