Reference no: EM131370740
Assignment: Hacking the AIS
In today's technology environment, hackers present a substantial risk to a firm's accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.
For this assignment, research the Internet or School databases and select a company whose database systems have been hacked.
Write a five to seven page paper in which you:
1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
4. Provide at least three recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
5. Use at least three quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
• Use technology and information resources to research issues in accounting information systems.
• Write clearly and concisely about accounting information systems using proper writing mechanics.
What is the budgeted cost for student advising for june
: If Kingston State University uses the discretionary-cost method to implement cost SBU's, what is the budgeted cost for Student Advising for June?
|
Logical connection to the study question
: Ideally, it will ask an original question rather than one that has already been reviewed by the literature. Remember: Research builds on itself. It may be similar to something you have read, but it may not be the same.
|
Discuss about the prohibited employment policies
: Provide an example of two (2) of the following techniques or methods that you or someone that you know has endured or witnessed: unfair recruitment, employment application, and interview process.Investigate the extent to which the chosen technique..
|
Resulted from refinement of a random process
: What are your thoughts concerning the probability that programmed development resulted from refinement of a random process?
|
Evaluate the level of responsibility of the company
: Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
|
Find the mean and the variance of the code
: If a yes answer is coded 1, a no answer is coded -1, and an undecided answer is coded 0, find the mean and the variance of the code.
|
Technological advancements that would be available
: Envision what the health care system of 2030 might look like? Describe at least two technological advancements that would be available to patients. How would technology help providers make health care decisions? How would patients and families int..
|
How the rest of the sample is obtained
: Suggest a way of doing this so that no problems would result due to the fact that 855 is not an integer multiple of 30. Give the first element you choose to select, and explain how the rest of the sample is obtained.
|
Healthcare delivery systems complement
: How do public health and healthcare delivery systems complement and compete with each other? Who are the influential parties and opinion leaders in the components of these systems at the various levels?
|