Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Assignment 2: Hacking the AISDue Week 4 and worth 240 pointsIn today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these

Assignment 2: Hacking the AIS

Due Week 4 and worth 240 points

In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.

For this assignment, research the Internet or Strayer databases and select a company whose database systems have been hacked.

Write a five to seven (5-7) page paper in which you:

  1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
  2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
  3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
  4. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
  • Use technology and information resources to research issues in accounting information systems.
  • Write clearly and concisely about accounting information systems using proper writing mechanics.
Show more
Geffmurimi
Geffmurimi
  • @
  • 1030 orders completed
ANSWER

Tutor has posted answer for $30.00. See answer's preview

$30.00

********* **** ***************** ***************** NameCourseDate               Equifax **** breachEquifax is *** of *** ***** ****** reporting ******** ** ************** *** *** **** ******** *** *** information ** **** than *** ******* ********* ******* *** **** ****** *** *** an ******** ****** from *** ** **** ** **** The information stolen ******** * social ******** ****** ***** ********* *** birth ***** Credit card ******* *** 209000 people were **** ******** ********** ***** The ****** **** ******** *** ***** ** information *** ********* in *** ** and *********** ** ********************* exercised ****** ************** ** *** ***** ****** ** *** ******** ****** **** **** acted *********** after *** ******** ****** was made ****** Equifax *** ******** ** the potential ******** ** *** ******* ** March **** ********** 2017) ******* ******* ** *** ****** weakness the ******* failed ** *** On a later **** ******* **** *** weakness ** ********** the Equifax ****** *** *********** irresponsibility ******* *** *********** ** ***** customers ** ** ****** Their ***** *********** officer *** ********* ************* ******* ** patching *** weakness *** *********** officer sold *** ****** ** Equifax ************ *** *********** ******* ******** ******* ****** **** *** **** ** *** ******* *** publicizedEquifax ******* ** ********* their ******* ** *** breach *** breach *** ********** ** 29th July **** *** the public *** ******** a ***** ***** The ******* was ********* and inconsiderate of *** ********* in ******* to publicize *** ****** (Muzatko & ****** 2018) ** ** ************** **** *** ******* was ****** ** mitigate *** impact ** *** ****** ** its ********* ***** ******* *** wrong ** ***** its ***** ***** ***** ** *** ********* ** is ******** ******** to ****** ********* of any *********** ****** **** *** affect **** ******** to ******* ******** information is likely ** ****** *** ******** ********** From *** **** *** customer *********** ** ******** they *** ********** to ******** ***** and credit card ***** *********** the ************ privacy has been ********* ******** **** ** ******** ******** ***** *** ****** ** which ** **** Equifax ** announce the ****** *** adequate for the ****** to actualize the risks ***** ** ******* customers *********** ******* *** **** ** announcing *** ****** ** *** clientsEquifax **** ****** *********** ***** *** ****** *** publicized The ******* hired * *** chief *********** ******* The *** information ******* *** ** **** ****** to *** **** security protocols *********** ** *** *********** *** ******* was ********* ******* ** ******** improving *** systems ** hiring qualified ********* ** **** ****** *** security ********** that *** *** ** *** **** ****** ******** *** **** ***** ** *** breach ********* ******* ***** ** ****** information *** company also ******** further ******** vulnerabilities in *** ****** All vulnerabilities ********** **** ******* ** ******* *** future breach ** *** ****** *** ******* **** improved *** *********** ********** ** control the *********** ****** ** *** ****** ********** ****** minimizes *** *********** ** ************ ********** *** company ****** ** *********** ******** in *** way ** informed *** ******* ** the breach *** *** ** ****** **** ******* the ******* Equifax **** *** ** **** ******* ** ****** *** *** ********* ******** ** *** ****** ********* *** ********* through *** **** ******* is safer *** values *** ******** privacy It is **** * ******** *** ** reaching *** ******* ** ***** **** **** ********* *** *** company ** publicize *** ***** ** ***** **** **** ******** ** the ****** Publicly ********** ***** ***** **** have been * ******* ****** ** ***** ******* ******* *** also *********** ** the *** ** ******** *** ******* through *** ******* The ******* established a dedicated * ******** care ******* for ***** ******** ** *** ****** ** ******** ******** to those **** called them ** *** ** manage *** ****** ******* **** *********** * dedicated *** page ** ***** for the ******* ***** *********** *** ****** *** ******* ******** ********** ** follow to ******* any ********* **** ** identity theft ** **** hired * new ***** information officer ** ***** the vulnerabilities in *** ****** ******* it *********** ******** **** ******** to guide the affected ********* on ********* ******* to ******* *** misuse ** *** ****** ************* summary Equifax ********* *** ****** ** responsibility in ***** breach ******** in *** ***** ****** It ****** ** seal the breach when ********** ******* *** ***** *********** ******* **** *** *********** *** insider trading ** ******* *** ****** ** the ******* ******* **** ******* in notifying the ******* ******** to prevent *** ***** *** ****** ***** ** *** customers On *** other **** ******* ****** high ****** ** ************** ** ****** ******* notifications to ******** ******* ******* *** ****** ************* PartyIn *** ********** that the software *** ******** ** * third ***** **** *** ***** party ** *********** *** *** ****** That ** not to say **** ******* ** ***** ******** **** the breach Equifax ** ***** *********** ** *** ****** that he ******* ******** ** **** ***** ************ *********** ******* is ******** to *** *** ***** party ****** providers *** their ******** credibility ************ *** ***** party ********* **** a responsibility ** *** ******** *** its ******* ** the **** ** * ******** ** ***** **** *** ******** ************** is transferred ** the third party once it ****** to **** *** ********** ****** ** *** ******* ** ** *** ************** to ensure **** ** *********** *** ***** firewalls and ***** ******* ********** measure ******* ***** ********* *** ***** ***** ** responsible *** *** *** ******** ** *** ****** *** ***** ***** *** to ensure that *** security protocols *** ********** ** protect *** **** ******** *** **** of *** ****** *** ***** ***** is responsible ** ****** ******* ** *** ****** ******* has to be informed ** the ********* damage *** ****** will **** ** *** ********* image *** ***** ***** ** also *********** *** exploring *** ****** ** *** ****** *** provide * ****** of the *********** that was ****** ** **** ** *** *** ** *** ******** ********* ******* can easily ******** all the legal obligations ** *** breach ** *** third ***** ******* *** ************ ***** that the third party ** fully *********** *** the ****** depending ** ***** ******** termsThe ***** party ****** ** *********** *** *** negative ********* and *** ********* obligation to ******* as a result ** *** breach ******* ******* the ***** party **** *** *********** **** its ******* ** ***** ********* the third party *** ** ensure **** ** ***** *** *** **** Equifax ***** **** ***** ** ******* *** ****** **** ** case the information breach ******* Equifax financially *** ***** party ****** **** *** **** *** cost directly ******* ** *** ********** and ** should ********* **** ** any ********* costs ** *** ********** the ***** ***** ****** ******** declare **** ** *** *** ************** *** not that of ******* * ****** ************** of *** responsibility **** **** ******** the *********** ** Equifax to *** ************ third ***** is directly *********** for ********** *** ******** **** ***** to ******* ********* ******* passed *** ************** *** *** information **** ** ******* the ***** party ** ******* ***** accounting *********** ****** *** ***** party will **** ** ensure **** it informs *** clients ** the ****** ******* ******* ** **** **** ensure that *** ******* *** ******** ** any ***** available ** ******** the ****** of the stolen **** *** ***** ***** ** **** responsible for *** ********* **** ********* the ******** *** ********* **** ****** ** directly ****** ** *** ****** *** ***** ***** ***** ** **** *** ********* ************ ***** *** **** ******** from *** poor actions ** **** protectionAdditional ******************* ****** ** ******** to implement strict ******** ********* ** ******* ****** data ****** ********* of ********** ****** ** *********** ***** most companies **** perform the bare ******* *** regulations requiring the ******** are **** *** **** is *** ********* **** ******* *** Facebook *** tolerate **** ***** ********** *** regulatory ************ **** ***** companies to do more ** ********** ***** ******* ************************* can ******* ***** ******* ******* *** implementation of ********* *** ******* ********** ******* *** ******** ****** **** hackers ** *** **** ****** to *** ****** through viruses *** malware attacks The security systems ****** ** frequently ******* to *********** *** ****** ******* *** viruses ** the databases **** is ******* hackers ******* new **** ** ********* ******** ********** company ****** ********* ***** ****** ************ and limit ****** access ** *** ****** **** ********** ** *** ****** ***** ******** ** hackers *** ******* should ******** ****** access requirements ** ******* **** ******* ** should also ******** *** ****** requirements *** ************** needs *** ********* *********** Limiting the ****** ** ****** **** access ********* information ******* *** risk ** ************ **************** ****** **** ********* frequent ****** audits ******* techniques *** ****** ******** (Groomer ***** ****** ***** Companies **** ** ******* ***** ******* *** *** ****** **** ****** if **** are *** ********* against *** *** techniques *** audit **** involves identifying ********* *************** ** *** system *** vulnerabilities *** ***** **** ****** ******* ** ******** intrusion ********** *** *************** identified ****** ** ******* to ******* ****** attacks   ReferencesO’Brien * * (2017) ***** ******* data ******* 143 ******* ****** ***** be affected CNN *********** * ***** Bansal G ****** ****** ** **** ****** ************ *** ********** *********** * * ****** *********** ********* ****** ************** *********** *** compliance ******** ******************* * * ***** Murthy U * ****** ********** auditing of ******** ************* ** ******** audit ****** ******** ** ********** ********* ****** *** *********** *** 105-124) ******* ********** ***********

or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question