100% (1)
Pages:
5 pages/≈1375 words
Sources:
3
Style:
APA
Subject:
Accounting, Finance, SPSS
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 26.33
Topic:

Hacking the AIS

Essay Instructions:
Assignment 2: Hacking the AIS Due Week 4 and worth 240 points In today's technology environment, hackers present a substantial risk to a firm's accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems. For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked. Write a five to seven (5-7) page paper in which you: 1.Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale. 2.Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale. 3.Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument. 4.Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation. 5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: -Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. -Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Essay Sample Content Preview:
Hacking the AIS Name: Instructor: Affiliation: Course: Date: Introduction Information system is a set of interrelated components that collect, manipulate, disseminate data and information, and provide feedback to meet an objective. The managements in making the work of management easy use these systems. The system mainly uses the computers. These computers have hard wares that use soft wares that enable in the storage of this information. Only the authorized personnel`s of the company only access the information stored. These personnel`s have access codes and passwords to these documents. These numerous types of management information these may includes; the executive support system, management information system, decision support system, knowledge management system, transaction-processing system, office automation system etc. these systems perform different management roles in different departments in the organization. These heads of the departments are the ones that possess the passwords and access to these systems. Sometimes individuals may enter into these accounts with the capability to unlock the passwords of the certain accounts. These people enter access to these accounts with the intentions of getting the confidential documents and information of the company. Some people who got to the information of the may sometimes damage the information or give it to the competitors of the company. Hacking is the process of illegally accessing the privately protected information of a particular organization or individuals. Hackers do this by forging the passwords of these systems or the system designers may give the pass codes of these accounts to the intruders (Covaleski, 2013). This paper discusses the context of hacking; mainly focusing the example of a company hacked. We will focus much on the Accounting information system of this company. It discusses the effect that caused these, and the effects to the company. It also gives the possible measures that the company can adopt in order to prevent these cases from happening. Finally, the paper gives a conclusion and views of the whole context. Accounting information systems are the systems that accounting related data for a particular company or an enterprise. Under the care of the accounting department, he/she has the access passwords to these accounts. The accounting department is the most sensitive department in the business since it makes control of money of all stakeholders of the company. Hence hacking these account leads to greater damage and damages the reputation of the company to the public. This example happened to the Gawker media companies in the month of December the year 2010. The accounts of the company were hacked and there were more than one and a half million passwords and usernames that were released to the pirate`s bay. Upon the hacking, it is the company`s responsibility to accept the blames for the acts. This involves explaining to the stakeholders of the company on the causes of the act. If there are any damages to be paid, the company pays all the expenses involved. The system security and the knowledge workers should be held responsible for this and pay dearly for their negligence. The Gawker media company`s hacked accounts saw the company being brought down so easily. The cause of the hacking was that the designers of the system provided very weak passwords and usernames that were recognized by the malicious users without much strain. They got the information that was used by the enemies of the company to paralyze its activities. The company`s management rejected the blame that they had installed weak passwords. They however blamed the accounts users who used some weak passwords in the email accounts; the company claimed that it had installed very strong passwords and username. The accounts security department also were imposed the blame for not checking the accounts well to see the passwords used and the level of their capability to be hacked (Sarngadharan, et al, 2010). The company using the third party accounting system, where the information that was kept in the systems involved all...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!