Explain the level of responsibility of the company

Assignment Help Management Information Sys
Reference no: EM131376655

Assignment: Hacking the AIS

In today's technology environment, hackers present a substantial risk to a firm's accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.

For this assignment, research the Internet and select a company whose database systems have been hacked.

Write a five to seven page paper in which you:

1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.

2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.

3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.

4. Provide at least three recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
• Use technology and information resources to research issues in accounting information systems.
• Write clearly and concisely about accounting information systems using proper writing mechanics.

Reference no: EM131376655

Questions Cloud

How the article can enhance your professional decisions : Discuss how the article can enhance your professional and education decisions in the future. Additionally, explain how you will apply the information in the article to your everyday lifestyle.
Solve the dilemma using kant ethics : Create a 2-4 paragraph "dilemma" similar to the other dilemmas you have been solving throughout this term. Solve the dilemma using Kant's ethics (Categorical Imperative)
What can organizations do to protect themselves : What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?- What can organizations do to protect themselves from hackers looking to steal account data?
How many vending machines should wendy sell : Wendy sells vending machines. She can sell 9 machines if she charges $1,000 per machine; 8 if she sells them at the price of $1,100 per machine; 7 at the price of $1,200 per machine, and 6 at the price of $1300 per machine. Each vending machine co..
Explain the level of responsibility of the company : Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
Summarize a statistic reported in a popular magazine article : Briefly summarize a statistic reported in a popular magazine article or website. Describe how they inaccurately portrayed information and what else would need to be considered when looking at this statistical information
Difference between file sharing and internet radio streaming : Why is claiming a lack of copyright knowledge not a good defense against illegally sharing movies or music? If you do not have a good understanding of information laws, what can you do to ensure you are never placed in a federal lawsuit for violat..
What is the theoretically optimum diameter of drilled hole : The bolt fractures next to the nut, as shown. A proposed redesign, Figure P7.22b involves drilling an axial hole in the unthreaded portion and incorporating a larger fillet radius under the bolt head.
Changes in demand and supply of particular goods : Refer to week 2 content materials and use specific economic vocabulary within your summary, i.e. demand, quantity demanded, determinants of demand, shifts in demand curve, etc. Likewise with supply. Also you should discuss changes in equilibrium q..

Reviews

Write a Review

Management Information Sys Questions & Answers

  A project plan schedule and a staff organisation

A Project Plan Schedule and a Staff Organisation. Note: Your group will continually revise the Project Plan Outline draft as you receive feedback from your Instructor.

  What areas of technology would you have to focus on

What would your responsibilities be to business intelligence implementation within your organization? What areas of technology would you have to focus on?

  Description of updates to the pmp and related plans

In this assignment, you will work in teams of four (4) people to produce a PMP, a description of updates to the PMP and related plans/documents and a record of your experiences working in the team

  What is the real exchange rate and what is stagflation

On a correctly labeled graph, show AD, SRAS, LRAS, actual GDP, potential GDP and the equilibrium price level -  government increases its spending by making three new Star Trek movies - On a graph, show the effect on AD, SRAS, LRAS, actual GDP, potent..

  What are the advantages and disadvantages of social media

What are the advantages and disadvantages of social media? How might knowing these advantages and disadvantages alter how a person might use social media?

  Explain the operational components of planning

Describe the operational components of planning, sourcing, making, and delivering

  Describe information systems that fitness quest could use

Describe information systems that Fitness Quest could use to strengthen its strategy for bringing Indo-Row to market. Consider the factors you iden- tified in your answer to question 6 in your response.

  Research a multinational corporation then answer the

research a multinational corporation. then answer the following questionshow do the changing technology and the falling

  What is cumulative time to complete the first 3 transplants

What is the cumulative time to complete The first 3 transplants,  The first 6 transplants ,  The first 8 transplants and  The first 16 transplants?

  List and explain the memory constructs of the oracle

List and explain the memory constructs of the Oracle 12c databases. List and explain the background processes that support the 12c database. Explain why container and pluggable databases on a Linux server will use less memory compared to many Oracle ..

  Prepare a report identifying the causes of a new erp system

You have been asked to prepare a report identifying the causes of failure and recommendations to adopt a new ERP system. You need to thoroughly research, mount and justify proposed solutions for successful implementation of an ERP system.

  Strengths and weaknesses of personal selling

Show the strengths and weaknesses of personal selling, and describe a situation in which a company could benefit from including personal selling strategies in its IMC plan.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd