Reference no: EM131376655
Assignment: Hacking the AIS
In today's technology environment, hackers present a substantial risk to a firm's accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.
For this assignment, research the Internet and select a company whose database systems have been hacked.
Write a five to seven page paper in which you:
1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
4. Provide at least three recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
• Use technology and information resources to research issues in accounting information systems.
• Write clearly and concisely about accounting information systems using proper writing mechanics.
How the article can enhance your professional decisions
: Discuss how the article can enhance your professional and education decisions in the future. Additionally, explain how you will apply the information in the article to your everyday lifestyle.
|
Solve the dilemma using kant ethics
: Create a 2-4 paragraph "dilemma" similar to the other dilemmas you have been solving throughout this term. Solve the dilemma using Kant's ethics (Categorical Imperative)
|
What can organizations do to protect themselves
: What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?- What can organizations do to protect themselves from hackers looking to steal account data?
|
How many vending machines should wendy sell
: Wendy sells vending machines. She can sell 9 machines if she charges $1,000 per machine; 8 if she sells them at the price of $1,100 per machine; 7 at the price of $1,200 per machine, and 6 at the price of $1300 per machine. Each vending machine co..
|
Explain the level of responsibility of the company
: Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
|
Summarize a statistic reported in a popular magazine article
: Briefly summarize a statistic reported in a popular magazine article or website. Describe how they inaccurately portrayed information and what else would need to be considered when looking at this statistical information
|
Difference between file sharing and internet radio streaming
: Why is claiming a lack of copyright knowledge not a good defense against illegally sharing movies or music? If you do not have a good understanding of information laws, what can you do to ensure you are never placed in a federal lawsuit for violat..
|
What is the theoretically optimum diameter of drilled hole
: The bolt fractures next to the nut, as shown. A proposed redesign, Figure P7.22b involves drilling an axial hole in the unthreaded portion and incorporating a larger fillet radius under the bolt head.
|
Changes in demand and supply of particular goods
: Refer to week 2 content materials and use specific economic vocabulary within your summary, i.e. demand, quantity demanded, determinants of demand, shifts in demand curve, etc. Likewise with supply. Also you should discuss changes in equilibrium q..
|