Hacking the AIS
Kira Welcome
Professor: Dr. Willadene Tolmachoff
Accounting Information Systems April 29, 2015
Security breaches and data leaks have implications that not only effect a business’s reputation, but may also lead to litigation. Obviously, no business wants this and so prevention is always better than cure in terms of data security. If a company has adequate security controls in place then they should not be held liable for losses sustained in a successful attack made on their Accounting Information System (AIS) by outside sources. If a company is negligent about security controls then they should be held liable for losses sustained in a successful attack on their AIS. There are a variety of sources that threaten accounting information systems and if they are ignored by the company then this can destroy the relevance and reliability of the financial information. It is very important to establish security controls during the data collection process. During this process the transaction or event should be valid, complete and free from material errors. An unauthorized user can pretend to be an authorized user, which is called masquerading, another activity that hackers use during data collection is called piggybacking, which is tapping into the telecommunications lines (California Office of Privacy Protection, 2012).
Companies need to establish security controls during this process so hackers can’t get into their accounting information system. Threats during the data processing phase can also occur. A few threats that can occur during this phase would include: creating illegal programs, accessing or deleting files, destroying or corrupting a program’s logic through viruses, or altering a program’s logic to cause the application to process data incorrectly. A devastating loss of data could occur if the files aren’t properly backed up. An organization could damage their competitiveness or reputation during the information generation and reporting phase because theft, misdirection or misuse of the computer output. “Advances in information technology and increased use of the Internet require that management, accountants, auditors, and academicians become more knowledgeable and conversant in the design, operation, and control of accounting information systems” (California Office of Privacy Protection, 2012).
Organizations possess a myriad of sensitive information, including strategic plans, trade secrets, cost information, legal documents, and process improvements. This intellectual property often is crucial to the organization’s long-run competitive advantage and success. Consequently, preserving the confidentiality of the organization’s intellectual property, and similar information shared by its business partners, has long been recognized as a basic objective of information security. Confidentiality is becoming a major concern because wide area networks are giving customers and suppliers access to their systems and data. Companies that don’t adequately protect their data should be held liable to losses sustained to outside attacks on their accounting information systems. These companies underestimate and downplay computer control problems which can cause their systems to be hacked into (Romney and Steinbart, 2012). When they are moving from centralized, host-based computer systems to a networked system or Internet-based system they encounter complications because the network and internet-based systems aren’t fully understood. They neglect to implement data security as a strategic requirement and they management may pass by some time consuming control measures because of productivity and the cost of the implementation. In this case the company should be liable because they aren’t safe guarding their company from threats.
Email is an invaluable tool when it comes to business communications. However, it also presents a great opportunity for hackers to gain access to corporate networks, especially if
BC2 – Assignment 5 • Submission requirements for BC2 • Assignment #5 • Task 11 — Respond to queries from the reviewer 10 marks 1 BC2 Task 11, page 1 • Audit performance requirements • a) Review the query sheet returned by your marker. Answer all queries on the sheet. And rectify any errors mentioned on the query sheet. Enter details of the working papers in the “W/P corrected or expanded by” box on the query sheet. 2 BC2 - Task 11 • Note: Students will be required to respond to and correct queries…
Amorangi Assignment Coversheet Course: 910.515 – Relational Psychology A Assignment Details Assignment-2: Essay Date Due: Auckland: Nov 2 Christchurch: Nov 9 Word count: 1500 % of total grade: 40% Expected time: 30 hours Lecturer (Student to complete) Student Details Name: Sambhui Lal Date Submitted: 2/11/14 ID No.: 1140160 Word Count: 1497 ex. references Disclaimer of Plagiarism and Collusion I declare that, to the best of my knowledge, no part of this assignment for the above…
Linear Motion Assignment: Exercises 3 and 29: 1. When a ball rolls down an inclined plane it gains speed because of gravity. When rolling up, it loses speed because of gravity. Why doesn't gravity play a role when it rolls on a horizontal surface? While rolling level a ball does not roll with or against the vertical force of gravity, it neither speeds up nor slows down. The rolling ball maintains a constant speed; this happens because friction overcomes the ball’s inertia and brings it to a…
Assignment #2 ___________ Gen Bus 101 10/9/2013 Cheryl A. Larabee & Robert Morgan, In the article “Greece Sets Up Its Own EBay To Unload Property,” it talks about how Greece is striving to raise as much as 50 Million Euros a year from online property auctions in order to help pay down its debt. After the European Commission, European Central Bank and The International Monetary Fund, the three main lenders of money to Greece, all bailed out on…
Assignment 2: 4G Wireless Networks CIS 500 November 2, 2013 1a. Compare and contrast 3G wireless networks to 4G networks in terms of services and applications. Service and application, network architecture, data throughput and user perception. “Some examples of services offered by 3G wireless networks are CDMA2000 (also known as IMT MultiCarrier (IMTMC), Universal Mobile Telecommunications System (UMTS), and EDGE as well as a long list…
Assignment 2: Use Cases Noor Al Shadidi Strayer University Professor Major CIS 210 9/7/2014 Assignment 2: Use Cases A use case diagram demonstrates the uses and requirements of a process and its actors. When creating use case diagrams they should be simple and easy to understand so that all levels of outside users can see and understand the roles they have in the overall project (Chen, Slides 6,7).. Describe a Use Case, Complete with Typical and Alternate Courses that Document the Event of a Bank…
Ethic Code, A Must for A Successful Business. Bus 475-Assignment 2 Jean R Alerte Dr. James J. Kolacek Strayer University Ethic Code, a Must for a Successful Business. Business as a system is a combination of business commerce, occupations, and organizations that produces and distributes the goods and services that create value for people in a society. Today more than ever socially responsible in investing has led to the development of a large number of methodologies…
Shane Christie Assignment 2 Classical Architecture the Foundation of a New Nation After the revolution ended, the newly independent American’s wanted to create their own culture distinct from the British culture they had just escaped. This included the clothes they wore, the literature they read, the artwork, music, and furniture. The most visual of the changes is the architecture in the buildings that were being built. In order to show their new power and potential they had as a country, American’s…
Aromatherapy Homework Assignment Multiple Choice 1. Which of the fallowing practitioners are Not required to register under the local Miscellaneous Act? a) Manicurists b) Tattooists c) Acupuncturists d) Electrologist 2. What are hazardous oils? a) Essential oils that are unsuitable for pregnancy b) Carrier oils that may cause toxicity c) Essential oils that may cause toxicity d) Oils contra-indicated to epilepsy 3. What is the correct procedure if a client has an adverse reaction to the treatment…
Assignment 2: Mergers and Acquisitions Due Week 6 and worth 200 points Use the Internet to research a publicly traded company in the United States that has undergone a merger or acquisition within the last three (3) years. Take note of the circumstances surrounding the merger or acquisition. Write a four to six (4-6) page paper in which you: The specific course learning outcomes associated with this assignment are: 1. Evaluate the different forms of business ownership to determine the optimal structure…