Reference no: EM132160025
Question: Hacking the AIS
In today's technology environment, hackers present a substantial risk to a firm's accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.
For this assignment, research the Internet and select a company whose database systems have been hacked.
Write a five to seven (5-7) page paper in which you:
1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
4. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
5. Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
How will you handle customers and returns
: How would your business work in term of operations (production, inventory control, distribution, customer service, research and development, etc.)
|
Explain why an erm is a senior management issue
: Companies create business records of many types and store the electronic files using an electronic records management (ERM) system.
|
What information about the ell is gathered from them
: In this assignment, you will write the fourth reflective journal response of this course. You will write six such journal responses in the entire course.
|
Great examples of leaders communicating
: There are lots of great examples of leaders communicating their vision for change, such as Martin Luther King, Nelson Mandela, Malala Yousafzai
|
Evaluate the level of responsibility of the company
: Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security.
|
What kinds of data from the external environment
: What kinds of data from the external environment should leaders monitor and why? Discuss thoroughly!
|
Catering business employing four workers
: Sheila James owns a catering business employing four workers. She just got a contract to cater a wedding reception for a Chinese couple who speak very little
|
How will the use of this strategy assist ells
: How will the inclusion of this strategy assist in addressing the course objectives? How will the use of this strategy assist ELLs?
|
How a firm manages the balance of high availability
: In the global enterprise, firms are insistent that their accounting information systems (AIS) and other key systems are available 100% of the time.
|