Preview

Ais Attacks and Failures: Who to Blame

Good Essays
Open Document
Open Document
851 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ais Attacks and Failures: Who to Blame
AIS Attacks and Failures: Who to Blame
ACC564
2/17/13
Professor Ridilla

AIS Attacks and Failures: Who to Blame Accounting information systems is a computer based database that stores, collects, and processes the financial data of the organization. The AIS system is then backed up by the organizations centralized database. When the AIS system is attacked by outside sources the responsibility falls to the organization if the proper controls are not in place but if the proper controls are in place the fault should fall on the shoulders of the criminal committing the attack or failures of the organization to put in place an effective accounting information system that is not prone to failure. There are several different types of threats that can be posed to the accounting information systems of an organization and when ignored can create grave damage to the organization. One threat to the AIS of the organization is the threat of the unauthorized user. Organization needs to have strict controls on who has access to computers that relate to the information system of the organization t prevent loss or to prevent damage. Unauthorized users can also come in the form of hackers that find back doors into the company’s AIS in order to steal sensitive information or to wreak havoc with the information systems. It is essential in the new Information Age for the management is knowledgeable on the AIS and the needed security measures to protect this system. Software systems and centralized databases containing the sensitive of an organization have become the norm in society. Because this information includes the private information of the organization and the consumer, the organization has a responsibility to have the necessary security measures in place to stop attacks as well as have the necessary expertise to provide an effective response in the event of the AIS system failing. The management should be held responsible for ensuring

You May Also Find These Documents Helpful

  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Ais Attacks and Failures

    • 1768 Words
    • 8 Pages

    * You are a fast growing company and need a system that can grow with you?…

    • 1768 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing the enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well the concepts for protecting the hardware and software assets of the enterprise.…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Best Essays

    Insider Threats

    • 4039 Words
    • 17 Pages

    In recent years, countries around the world have been developing rules and regulations which are designed to support data confidentiality and security. Many organizations have spent decades on building stronger defenses against intrusion, including firewalls, anti-virus software, email security, identity access badges, security policies and procedures. These protections have made the business world more effective at blocking threats and attacks from the outside and made it increasingly difficult for hackers and viruses to penetrate into the system. However these protections provide only a first line of defense since it is designed to prevent unauthorized access.…

    • 4039 Words
    • 17 Pages
    Best Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    There are a variety of sources that threaten accounting information systems and if they are ignored then this can destroy the relevance and reliability of the financial information. [ (Wen, 2007) ] It is very important to establish security controls during the data collection process. During this process the transaction or event should be valid, complete and free from material errors. (Wen, 2007) An unauthorized user can pretend to be an authorized user, which is called masquerading. Another activity that hackers use during data collection is called piggybacking, which is tapping into the telecommunications lines. Companies need to establish security controls during this process so hackers can’t get into their accounting information system. Threats during the data processing phase can also occur. A few threats that can occur during this phase would include: creating illegal programs, accessing or deleting files, destroying or corrupting a program’s logic through viruses, or altering a program’s logic to cause the application to process data incorrectly. [ (Wen, 2007) ] Unauthorized access to database management could cause threats by altering, deleting, corrupting, destroying or stealing data. [ (Wen, 2007) ] A devastating loss of data could occur if the files aren’t properly backed up. An organization could damage their competitiveness or reputation during the information generation and reporting phase because theft, misdirection or misuse of the computer output. [ (Wen,…

    • 815 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The argument in favor of the contention is that the accounting information system not only processes financial transactions to provide internal reports to managers but also does external reporting to outside parties such as stockowners, government and lenders. Since, it is essential that the accounting information system should be accessed by outsiders the system is particularly vulnerable to outside attacks (1). Still the onus of the security of its accounting information system clearly lies with the company and…

    • 838 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    References: Abu-Musa, A.A. 2002a. Security of computerized accounting information systems: A theoretical framework. Journal of American Academy of Business, Cambridge. Hollywood: Sep.Vol.2, Iss. 1; pg. 150, 6 pgs…

    • 2842 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    First of all confidentiality in respect to information systems is where information is restricted or limited to only persons authorized to use it. Confidentiality of information is especially important to businesses that thrive on sensitive customer information, example those who receive payments online and banks who store customers financial and personal information. However it is also a great concern to companies such as retailers and manufacturing companies as they may depend on this information to a certain extent (e.g. to decide on effective marketing strategies and to gain a competitive advantage). Confidentiality of a business’s information may be threatened in many ways. Persons may try to gain unauthorized access of a business’s sensitive information for personal gain e.g. identity theft and phishing. They may also attempt to steal secrets such as a business’s trade secrets and processes which give them a competitive advantage and also government agencies top secret information. Some technologies which can be used to increase the level of confidentiality are authentication methods which control the access to certain information such as password logins, single sign on, password updates and specifications.…

    • 654 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    business plan

    • 429 Words
    • 2 Pages

    There are many issues related to the security by the organization since it is a complex issue. Thus, many issues are highlighted as research problem.…

    • 429 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The path for risk management and the security panels consumed by a corporation are offered by information security strategy and architecture, which is very important to any companies and organizations. The security architecture would need to define the way that obligation would be accomplished in the numerous regions of the corporate. Furthermore, the security architecture must report past activities that have affected the company’s information properties. These incidences designate areas that may need larger safekeeping controls. Fresh intimidations may compel differences in the security design and supplementary controls. The safekeeping design must also integrate with the current technology substructure and postulate assistance in inaugurating the appropriate risk controls needed for the corporate to accomplish its business firmly.…

    • 1522 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 1463 Words
    • 6 Pages

    - Security issues for particular data systems and information processing facilities, given business needs, anticipated threats and vulnerabilities;…

    • 1463 Words
    • 6 Pages
    Powerful Essays