Explain the level of responsibility of the company

Assignment Help Management Information Sys
Reference no: EM131376655

Assignment: Hacking the AIS

In today's technology environment, hackers present a substantial risk to a firm's accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.

For this assignment, research the Internet and select a company whose database systems have been hacked.

Write a five to seven page paper in which you:

1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.

2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.

3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.

4. Provide at least three recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
• Use technology and information resources to research issues in accounting information systems.
• Write clearly and concisely about accounting information systems using proper writing mechanics.

Reference no: EM131376655

Questions Cloud

How the article can enhance your professional decisions : Discuss how the article can enhance your professional and education decisions in the future. Additionally, explain how you will apply the information in the article to your everyday lifestyle.
Solve the dilemma using kant ethics : Create a 2-4 paragraph "dilemma" similar to the other dilemmas you have been solving throughout this term. Solve the dilemma using Kant's ethics (Categorical Imperative)
What can organizations do to protect themselves : What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?- What can organizations do to protect themselves from hackers looking to steal account data?
How many vending machines should wendy sell : Wendy sells vending machines. She can sell 9 machines if she charges $1,000 per machine; 8 if she sells them at the price of $1,100 per machine; 7 at the price of $1,200 per machine, and 6 at the price of $1300 per machine. Each vending machine co..
Explain the level of responsibility of the company : Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
Summarize a statistic reported in a popular magazine article : Briefly summarize a statistic reported in a popular magazine article or website. Describe how they inaccurately portrayed information and what else would need to be considered when looking at this statistical information
Difference between file sharing and internet radio streaming : Why is claiming a lack of copyright knowledge not a good defense against illegally sharing movies or music? If you do not have a good understanding of information laws, what can you do to ensure you are never placed in a federal lawsuit for violat..
What is the theoretically optimum diameter of drilled hole : The bolt fractures next to the nut, as shown. A proposed redesign, Figure P7.22b involves drilling an axial hole in the unthreaded portion and incorporating a larger fillet radius under the bolt head.
Changes in demand and supply of particular goods : Refer to week 2 content materials and use specific economic vocabulary within your summary, i.e. demand, quantity demanded, determinants of demand, shifts in demand curve, etc. Likewise with supply. Also you should discuss changes in equilibrium q..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Organizational change consulting been impacted by technology

How Changing Technology is Shaping Business - How has the need for organizational change consulting been impacted by technology?

  Ability to create new knowledge

How do you know that you have captured the right data - the nature of success is tied to the ability to create new knowledge, what skills are needed by the people in my organization to succeed?

  Importance of having plans for employee security training

Discuss the importance of having plans for employee security training. Provide specific examples of how training can result in a higher level of enter

  What companies currently use hadoopo related technologies

How is an Hadoop Distributed File System different from a Relational Database system? What organizational issues are best solved using Hadoop technology? Give examples of the type of data they will analyze.

  Handle the changes required by adopting a new system

How do you prepare employees to handle the changes required by adopting a new system? How would you handle numerous requests for change to a system that has just been implemented?

  Explain what are security policies or e-policies

Information Security and Ethics: Protection Policies and Procedures - Explain What are security policies or e-policies? Explain three security policies that you would primarily recommend to an organization to have as a minimum and why? How security..

  Important information about too much informationresponse

important information about too much informationresponse for both these questions relative to the role of a

  What is knowledge management

What is knowledge management and what are its primary benefits? Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must ..

  Determine the service utilization

Simulate the process for the first twenty persons arriving for flu shots.-  Determine the average time in queue.- Determine the service utilization.

  Explain how a specific system used in an organization

Write a 700- to 900 -word paper identifying and describing how a specific system used in an organization has transformed how the organization operates

  Discuss the need to monitor expenses related to the response

Discuss the need to monitor expenses related to the response, continuity and recovery to an incident. How is this need best accomplished? How would it be different under the Incident Command System?

  Why are shares a source of system vulnerabilities

How does Microsoft Baseline Security Analyzer (MBSA) differ from Windows Update? Why are Shares a source of system vulnerabilities

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd