Preview

Hacking: Implications for Computerized Accounting Information System

Powerful Essays
Open Document
Open Document
2842 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking: Implications for Computerized Accounting Information System
HACKING
AND
IMPLICATIONS FOR COMPUTERIZED ACCOUNTING INFORMATION SYSTEM

Introduction
Along with the growth of computerized accounting information system (CAIS), the threats to the security of these systems have also grown. One such threat is hacking. In the recent years hacking has become a serious concern for businesses. Although, most hackers claim that they indulge in this activity for intellectual challenge, this is not always the case. In this paper we learn that hackers attempt to bypass the security mechanism of information systems not only for the thrill of learning, but also for the malicious intent of gathering information for gain.
HACKING
Meaning
Hacking is commonly used to refer to forms of trespass against a computer belonging to someone else. As per Infosec, a website devoted to information security – "Hacking means illegally accessing other people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems". Digitalguards defines it as, "Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network".

History
At first, "hacker" was a positive term for a person with an expertise in computers who could push programs beyond what they were designed to do. Hacking has been around pretty much since the development of the first electronic computers. In 1960s, the first computer hackers emerged at MIT. University facilities with huge mainframe computers became breeding ground for hackers. In 1970s, phreaks broke into phone networks to make free calls. In the next decade, phone phreaks began to move into the territory of computer hacking, and the electronic bulletin board systems (BBSs) came into being. Hacking groups began to form. Among the first were Legion of Doom in the United States, and Chaos Computer Club in Germany. In the last decade, with the advent of internet, hackers moved all the hacking related information from old BBSs to new hacker



References: Abu-Musa, A.A. 2002a. Security of computerized accounting information systems: A theoretical framework. Journal of American Academy of Business, Cambridge. Hollywood: Sep.Vol.2, Iss. 1; pg. 150, 6 pgs Abu-Musa, A.A Brandt, A. and Zetter. K. 2005. Net Threats: Hacker Nation. PC World Casabona, P and Yu, S.1998 Humber, T. 2003. Is your HR system safe from hackers?. Canadian HR Reporter. Toronto: Nov 3. Vol.16, Iss. 19; pg. G3. Krone T. 2005. Hacking Motives. Australian Institute of Criminology Lawyers Weekly USA Staff Lewis, B. 2005. IT Expertise Becoming a More Highly Prized Asset for Accountants Serving Small Business Clients. http://www.microsoft.com/smallbusiness/accountants/articles/it_expertise_becoming_a_more_highly_prized_asset.mspx Li, Y Luehlfing, M. S., Daily, C. M., Phillips Jr, T. J., and Smith, L. M. 2000. Defending the security of the accounting system. The CPA Journal. New York: Oct.Vol.70, Iss. 10; pg. 62, 4 pgs. Shaw, E. D., Post J. M., Ruby K. G. 1999. Inside the mind of the insider. Security Management. Arlington: Dec 1999.Vol.43, Iss. 12; pg. 34. Stevens, M. G. 1998. How secure is your computer system?. The Practical Accountant. Boston: Jan.Vol.31, Iss. 1; pg. 24, 8 pgs U Wikipedia. 2005. Zorkadis, V and Donos, P

You May Also Find These Documents Helpful

  • Good Essays

    Case Study

    • 625 Words
    • 3 Pages

    References: Beard, Deborah & Wen (2007). Reducing the Threat Levels for Accounting Information Systems. The CPA Journal Online. Retrieved from http://www.nysscpa.org/cpajournal/2007/507/essentials/p34.htm…

    • 625 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Turner, L. (2009) Accounting Information Systems: Controls and Processes. Hoboken, NJ: John Wiley & Sons, Inc.…

    • 3275 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Best Essays

    This essay briefly introduces the perceived threats of Computerized Accounting Information System and provides suggestions on how to prevent the occurrence of these potential dangers. Though the computer technology makes the accounting operation more accurate and faster, this still involves several threats in terms of the security and reliability of the accounting information. Fraudulent activities, management cheats, virus infection, costs and so forth, are all need precaution from the operation of the organization. However, proper selection of software, execution of internal control and other precaution measures may help relieve from the threats.…

    • 1788 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    Accessing data within an organization on a regular basis is much easier with the help of an insider, and security firms are reporting an increase in the number of data breach incidents that can be linked to an insider who has been coerced by the hackers into co-operating.…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 311 Words
    • 2 Pages

    When an unauthorised person uses a network, internet or modem connection to gain access past security password or other security to see data stored in another computer.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    What Really Is a Hacker?

    • 424 Words
    • 2 Pages

    meant to be a invasion of privacy issue, but rather free use of all computers…

    • 424 Words
    • 2 Pages
    Good Essays

Related Topics