Preview

Accounting Information System Security

Better Essays
Open Document
Open Document
1586 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Accounting Information System Security
Since the society has become progressively dependent on networks for business, the management of company’s information online has developed into an issue to be concerned. AIS, which is short for Accounting Information System, is not merely related to accounting information management as the business develops around the world. In the various explanations of AIS in the Lecture 1, p12130 Accounting Information System, presented at the University of Nottingham Ningbo by Trevor Bayley, Vaassen (2002) defined AIS as provides information for decision-making and accountability to internal and external stakeholders providing the right conditions for decision making and ensures that no assets illegitimately exit the organisation. In terms of practice of business by networks, the security of information is important. This essay will first describe a related News story. Then, several ways of illegally getting access to essential information by hackers will be provided. Moreover, considering the formation and reality of network business, the essay will analyse how to guarantee the security of a company from two aspects, externally and internally. Finally, a brief conclusion will be provided.

Reported by BBC News (2011), hackers, who targeted crucial information of oil exploration and bidding contracts, have penetrated the networks of at least five oil and gas firms for years. These penetrations started in November 2009 and are estimated to have touched a dozen multinational oil, gas and energy companies. Revealed by Greg Day, the director of security strategy at McAfee, cyber-attacks are more likely to invade the networks that are established by code and tools easily accessible on the internet. It is analyzed that hackers first control the external server of a company’s website in order to have access to internal networks. Once the previous work done, hackers will make the internal network settings paralyzed for the purpose of obtaining sensitive documents, proprietary



References: BBC News (2011) Hackers hit 'at least five oil and gas firms ' [online] Available from [29 April 2011] Kinkus, J.F (2002) Science and Technology Resources on the Internet Computer: Security [online] Available from [29 April 2011] Maslin Masrom dan ,Z.I Computer Security and Computer Ethics Awareness: A Component of Management Information System [online] Available from [29 April 2011] Raines, J (2008) Cybercrime and how to prevent it [online] Available from < http://ezinearticles.com/?Cybercrime-and-How-to-Prevent- It&id=1792667> Romney, M. B. and Steinbart, P. J. (2009) Accounting Information System. New Jersey: Person Education, Inc. Shaw, E et al (n.d.) The Insider Threat to Information. System The psychology of the Dangerous Insider [online] Available from [29 April 2011]

You May Also Find These Documents Helpful

  • Powerful Essays

    The path that data follow in an AIS, for example from manual source document to completed output report, is called an audit trail.…

    • 2786 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    This essay briefly introduces the perceived threats of Computerized Accounting Information System and provides suggestions on how to prevent the occurrence of these potential dangers. Though the computer technology makes the accounting operation more accurate and faster, this still involves several threats in terms of the security and reliability of the accounting information. Fraudulent activities, management cheats, virus infection, costs and so forth, are all need precaution from the operation of the organization. However, proper selection of software, execution of internal control and other precaution measures may help relieve from the threats.…

    • 1788 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Is this a true or false statement? "Companies should not be held liable for losses sustained in a successful attack made on their AIS by outside sources." Most sources say if the security is in place and properly installed it should be a rare instance when the AIS is attacked and made vulnerable by outside sources. Hacking is an unpredictable intrusion. Liability is usually on the party who acted in negligence. The argument here is justly made that no company should be punished for a breach in security if the company has prepared for such an attack. The result of this leniency could be detrimental to the integrity of the company and their ability to protect their consumer’s proprietary information or even their own financial records. Information Systems are manmade and are unlikely to be infallible but it is the Information Technicians duty to insure the system is being tweaked and adjusted to avoid the onslaught of intruders. Accident forgiveness is the slogan for Allied Insurance they may be on to something based upon who is liable because they are already accident prone. If the company has no prior issues with hackers they should not be held liable but if it is an ongoing occurrence than most definitely there are issues with the protection and the company is held responsible and also a suspect in a fraud case.…

    • 844 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    New technology in information systems have bought significant changes in accounting profession, practices and processes. It has increased the efficiency and accuracy in accounting and has speed up the process for manual accounting tasks, but also improved security of accounting data and increased transparency. Large organizations and multinationals are changing over to this new information systems and technologies to carry out their accounting tasks on global basis. This information system has led to standardization not only among the different divisions, locations and offices of a single organization, but also on a global basis.…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The argument in favor of the contention is that the accounting information system not only processes financial transactions to provide internal reports to managers but also does external reporting to outside parties such as stockowners, government and lenders. Since, it is essential that the accounting information system should be accessed by outsiders the system is particularly vulnerable to outside attacks (1). Still the onus of the security of its accounting information system clearly lies with the company and…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Bloch, G. (2003). Sarbanes-oxley 's effects on internal controls for revenue. The CPA Journal, 73(4), 68-70. Retrieved from http://search.proquest.com/docview/212294542?accountid=12085…

    • 3018 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    i) A decision or action of a subsystem is inconsistent with the system as a whole.…

    • 1436 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    An accounting information system (AIS) is the system of records a business keeps to maintain its accounting system. This includes the purchase, sales, and other financial processes of the business. The purpose of an AIS is to accumulate data and provide decision makers (investors, creditors, and managers) with information to make decision While this was previously a paper-based process, most modern businesses now use accounting software such as UBS, MYOB etc. Information System personnel need basic, if not vast, knowledge of database management and programming language such as C, C++, JAVA and SQL as all software is basically built from platform or database. In an Electronic Financial Accounting system, the steps in the accounting cycle are dependent upon the system itself, which in turn are developed by programmers. For example, some systems allow direct journal posting to the various ledgers and others do not.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Removal of constraints on competitive market forces through free trade agreements. E.g. Australia-China, Australia-New Zealand, Australia-USA.…

    • 1039 Words
    • 5 Pages
    Good Essays