Preview

Ais Attacks and Failures: Who to Blame

Good Essays
Open Document
Open Document
851 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ais Attacks and Failures: Who to Blame
AIS Attacks and Failures: Who to Blame
ACC564
2/17/13
Professor Ridilla

AIS Attacks and Failures: Who to Blame Accounting information systems is a computer based database that stores, collects, and processes the financial data of the organization. The AIS system is then backed up by the organizations centralized database. When the AIS system is attacked by outside sources the responsibility falls to the organization if the proper controls are not in place but if the proper controls are in place the fault should fall on the shoulders of the criminal committing the attack or failures of the organization to put in place an effective accounting information system that is not prone to failure. There are several different types of threats that can be posed to the accounting information systems of an organization and when ignored can create grave damage to the organization. One threat to the AIS of the organization is the threat of the unauthorized user. Organization needs to have strict controls on who has access to computers that relate to the information system of the organization t prevent loss or to prevent damage. Unauthorized users can also come in the form of hackers that find back doors into the company’s AIS in order to steal sensitive information or to wreak havoc with the information systems. It is essential in the new Information Age for the management is knowledgeable on the AIS and the needed security measures to protect this system. Software systems and centralized databases containing the sensitive of an organization have become the norm in society. Because this information includes the private information of the organization and the consumer, the organization has a responsibility to have the necessary security measures in place to stop attacks as well as have the necessary expertise to provide an effective response in the event of the AIS system failing. The management should be held responsible for ensuring

You May Also Find These Documents Helpful

  • Powerful Essays

    It is best to view an AIS as an accounting system that must be computerized.…

    • 2786 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    A good accounting information system (AIS) will help create, maintain, and distribute the financial reports as well as perform tasks in payroll, accounts receivable, accounts payable, inventory, and budgeting (Bagranoff, Simkin, & Norman, 2010). Management will be able to set up controls in the system allowing staff to have access to what is necessary and appropriate for their job. They will be able to call up and modify this information electronically without searching or filling out new paperwork. Data entry will be mainstreamed, allowing for less key strokes, and integration of information. This will allow for better accuracy in accounting and accounts will be able to be managed more efficiently, including processing of bi-weekly payroll. Payroll will then be sent directly to processing and reports to the correct managers. Accounts receivable will be able to track when customers use the POS system and update the sales information. Accounts payable will track when a vendor payment is due, allowing for payment processing, and appropriate management and accounting reports. The inventory system will be more accurate saving Kudler time and…

    • 804 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 6923 Words
    • 28 Pages

    On the other hand, accounting information system is a system of collection, processing, and storage of financial and accounting data that is used for decision making. Accounting record is a part of accounting information system, which is any type of hard copy or electronic document that provides information regarding the financial situation of an organization or a company including recording of assets and liabilities, ledgers, prime entry books (daybooks) and other supporting documents such as invoice, debit notes, credit notes.…

    • 6923 Words
    • 28 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The data contained in an AIS is all the financial information pertinent to the organization 's business practices. Any business data that impacts the company 's finances should go into an AIS. This data can then be used to prepare accounting statements and reports such as accounts receivable aging, depreciation/amortization schedules, trial balances, profit and loss, and so on. Having all this data in one place - in the AIS - facilitates a business 's recordkeeping, reporting, analysis, auditing and decision-making activities. For the data to…

    • 580 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    accounting glossary grade12

    • 10137 Words
    • 41 Pages

    Accounting information system: A system that involves collecting and processing transaction data, and providing financial information to interested parties.…

    • 10137 Words
    • 41 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

     From 1101AFE you know the basics of Accounting. Accounting Information System (AIS) translates this knowledge into the real world. »…

    • 1071 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    First of all confidentiality in respect to information systems is where information is restricted or limited to only persons authorized to use it. Confidentiality of information is especially important to businesses that thrive on sensitive customer information, example those who receive payments online and banks who store customers financial and personal information. However it is also a great concern to companies such as retailers and manufacturing companies as they may depend on this information to a certain extent (e.g. to decide on effective marketing strategies and to gain a competitive advantage). Confidentiality of a business’s information may be threatened in many ways. Persons may try to gain unauthorized access of a business’s sensitive information for personal gain e.g. identity theft and phishing. They may also attempt to steal secrets such as a business’s trade secrets and processes which give them a competitive advantage and also government agencies top secret information. Some technologies which can be used to increase the level of confidentiality are authentication methods which control the access to certain information such as password logins, single sign on, password updates and specifications.…

    • 654 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: Abu-Musa, A.A. 2002a. Security of computerized accounting information systems: A theoretical framework. Journal of American Academy of Business, Cambridge. Hollywood: Sep.Vol.2, Iss. 1; pg. 150, 6 pgs…

    • 2842 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    business plan

    • 429 Words
    • 2 Pages

    There are many issues related to the security by the organization since it is a complex issue. Thus, many issues are highlighted as research problem.…

    • 429 Words
    • 2 Pages
    Satisfactory Essays