Evaluate the level of responsibility of the company

Assignment Help Management Information Sys
Reference no: EM131148652

Assignment: Hacking the AIS

In today's technology environment, hackers present a substantial risk to a firm's accounting orbusiness system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet and select a company whose database systems have been hacked.

Write a five to seven page paper in which you:

1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.

2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.

3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.

4. Provide at least three recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

THE QUESTIONS THAT ARE BEING ASKED NEEDS TO BE THE BEGINNING SENTENCE FOR EACH NEW SECTION PERTAINING TO THE QUESTION. (APA Style)

The specific course learning outcomes associated with this assignment are:

• Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
• Use technology and information resources to research issues in accounting information systems.
• Write clearly and concisely about accounting information systems using proper writing mechanic.

Reference no: EM131148652

Questions Cloud

Prepare cost of goods manufactured and the income statement : Prepare the Cost of Goods Manufactured and the Income statement based on the following numbers:-Inventories: Materials. . . .Beginning $65,000; ending $35,000
Find gain in decibels of amplifier that has a straight gain : Find the gain in decibels of an amplifier that has a straight gain of 7000? Find the current in a ground loop that is 200 m long, has a wire resistance of 0.06 ohms/m, and has a difference of 4 V between grounds?
Analysis of the impact of online shopping : Research proposal: Analysis of the impact of online shopping in leading to customer satisfaction and the growth of fashion industry in India: with special reference to Raymond
Design an arduino uno based motor control circuit : Design an Arduino Uno based 24VDC motor control circuit. The motor should start with the presence of a 5V signal, however it will have its own power supply.
Evaluate the level of responsibility of the company : Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach.
What are the budgeted sales for july : What are the budgeted sales for July? -  What are the expected cash collections for July? -  What is the accounts receivable balance at the end of July?
What would you expect would happen to the cost of equity : What would you expect would happen to the cost of equity if you had to raise it by selling new equity, and why? If the after-tax cost of debt is always less expensive than equity, why don't firms use more debt and less equity? What are some of the..
Discuss how energy is stored in capacitors and inductors : Discuss how energy is stored in capacitors and inductors. Are the equations linear or non-linear? How do you know? Discuss the concept of duality and why it applies to many fundament engineering concepts.
Describe the type of common chemical hazards : Describe the type of common chemical hazards that are present in your local environment, similar to those illustrated in the Tox Town interactive.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Mobile devices and outsourcing

Mobile devices and Outsourcing

  Construct a packet that minimizes the size of the packet

Construct a packet that minimizes the size of the packet. What data rate must your data connection be set at

  What are the three vs associated with big data

Watch the video, "Explaining Big Data" and answer the following question: What are the three "V's" associated with big data? Identify the values and briefly describe them

  Apple computers high technology personnel rapid response

apple computers high technology personnel rapid response support structureapple computers inc.1. what is apples special

  Why it projects failnumerous research findings indicate

why it projects failnumerous research findings indicate that approximately 80 of it projects are considered failures -

  What character string does the binary ascii code represent

What character string does the binary ASCII code represent

  Contrast the capabilities of microsoft excel and access

Compare and contrast the capabilities of Microsoft Excel and Microsoft Access. Propose a potential database design should Microsoft Access be selected.

  Discuss the various systems development methodologies

Possession of information can influence decisions in organizations. Discussion how new systems development can change the order of those who control the information and how this disruption may lead to resistance to adopting the new systems.

  Evaluate the organizing function of management

Prepare a paper in which you evaluate the organizing function of management as it relates to at the following organizational resources - Show whether or not your organization has optimized these organizational resources for effectiveness and efficie..

  Strategy to upgrade the companys current infrastructure

Recommend one (1) strategy to upgrade the company's current infrastructure to support the new / additional employees. Recommend one (1) strategy to create a high-performance network

  Determine how you would design the security controls

Determine how you would design the security controls to mitigate the risks involved. Determine the security defense mechanisms that you would utilize in order to secure communications from floor to floor in the office space, including equipment an..

  Ways national security agencies use technology to protect

how do local agencies, such as police departments, use technology to ensure security. ways national security agencies use technology to protect the public from threats

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd