Reference no: EM13860400
Assignment: Hacking the AIS
In today's technology environment, hackers present a substantial risk to a firm's accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.
For this assignment, research the Internet or Strayer databases and select a company whose database systems have been hacked.
Write a five to seven (5-7) page paper in which you:
Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
Use technology and information resources to research issues in accounting information systems.
Write clearly and concisely about accounting information systems using proper writing mechanics.
Dataset of two paired variables
: Problem: Consider a dataset of two paired variables, X and Y that have the following properties:
|
Compute mason and ruths 2013 federal income tax payable
: Compute Mason and Ruth's 2013 Federal income tax payable - Mason and Ruth are cash basis taxpayers and had the following items for 2013.
|
Briefly explain how collector current is obtain
: With the aid of diagram, briefly explain how collector current is obtain if the transistor is connected in c-e configuration. How is phase reversal achieved between the input and output in the circuit
|
Determine the change in pressure for an adiabatic process
: Determine the change in pressure for an adiabatic process using Argon that has an initial volume of 105-in3 and an initial pressure of 19-psia and a final volume of 19.1-in3.
|
Create an argument for additional regulation
: Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument - Examine control and security concepts related to accounting information systems to ensure data integrity and ..
|
What are the effectiveness of alternatives in control
: What are the effectiveness of these alternatives in controlling diseases?
|
Attributes: name, one or more physical addresses
: A book has the following attributes: title, author, publisher, year of publication, ISBN number, and number of pages. An author has the following attributes: first name, last name, date of birth, e-mail address, physical address, and phone number. A ..
|
Determine who should be held liable for any breaches
: Determine who should be held liable for any breaches that occur, and indicate the course(s) of action that should be taken.
|
Calculate the correlation coefficient
: Using excel, calculate the correlation coefficient, r, for the two variables. How would you interpret this measure?
|