Reference no: EM131376707
Assignment: Hacking the AIS
In today's technology environment, hackers present a substantial risk to a firm's accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.
For this assignment, research the Internet or Strayer databases and select a company whose database systems have been hacked.
Write a five to seven page paper in which you:
1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
4. Provide at least three recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
o Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
o Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
o Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
o Use technology and information resources to research issues in accounting information systems.
o Write clearly and concisely about accounting information systems using proper writing mechanics
Discus the implications of the empirical evidence
: Calculate the return for each of these investments (capital gain/loss plus dividend). a)My portfolio ends the year with a value of $12.72 million after paying dividends at the end of the year tothe value of $255,000.
|
Identify how the activity enhances physical development
: Physical development, especially in infancy and toddlerhood but also into middle/late childhood, is primarily focused on the development of fine and gross motor skills. But the milestones and activities for each age group are very different. For..
|
What are the economic implications
: Would the answer change if more insurance plans covered the expensive treatment options? What are the economic implications if the facility absorbed the cost of the treatment
|
Role of data mining
: Search for a relevant and/or timely article involving data mining. Describe the role of "data mining" in the story using your own words. Try to identify the type of data analysis method used (association, classification, cluster, outlier, etc.). (..
|
Create an argument for additional regulation
: Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
|
Flowchart and pseudocode to turn
: In this assignment you are to develop the logic to solve the following problem. Put your logic into a flowchart and pseudocode to turn in for a grade.
|
Do you think you ever take away your own sense of autonomy
: Do you think you ever take away your own sense of autonomy? If so, how? Is this apparent when making decisions in your romantic relationships
|
Network to scale with the companies growth
: When you design a network you keep in mind requirements concerning security, availability, recovery, and efficiency to name a few. How do you think you should design your network to scale with the companies growth? Where do VLAN's fit in?
|
Estimate the ratio of impact energy
: For the tensile impact bar shown in Figure P7.20, estimate the ratio of impact energy that can be absorbed with and without the notch (which reduces the diameter to 24 mm) Assume that K = Ki = Kt.
|