Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
Discussion: Accounting Systems and Accruals (20 points)For this week's Discussion, research the most common threats to a computerized accounting system using the Internet and/or Strayer databases. Be
- Discussion: Accounting Systems and Accruals (20 points)
- For this week's Discussion, research the most common threats to a computerized accounting system using the Internet and/or Strayer databases. Be prepared to discuss.
- Upon examination of the greatest threats to a computerized accounting system, suggest two (2) preventive measures or remedies that protect the system and/or mitigate any negative impacts to the system. Provide a rationale for your response.
- Your boss is concerned that the company’s computerized accounting system is vulnerable to attack. After reviewing the system, you’re in agreement. Write a brief report (approximately one [1] paragraph in length) of how someone might hack into your systems and commit fraud with the accruals. What major damages to the company’s financial statements could result from such a fraud?”
- For this week's Discussion, research the most common threats to a computerized accounting system using the Internet and/or Strayer databases. Be prepared to discuss.
- @
- 1030 orders completed
- ANSWER
-
Tutor has posted answer for $15.00. See answer's preview
************************ ******** threatsName:Institution: Accounting ******** threatsA ******* of ******* occur **** ****** operations within * ************* ******** **** of *** ******* ******* **** *** ********* in * computerized ********** ****** *** those ** unethical ******** by ********* *** those *** ** ******** breaches Confidentiality ** ********** ******* ** *** *** ** ******* *** change in *** *********** ** data may **** ** total ***** ********* behavior by the ********* *** ***** ** the ******** **** ** *** **** *** ************* activities ******* *** consent of ***** ********* *** ******** or ********* ****** ** conduct ********** ********** in ********* ** *** ******* ******** ** *** other **** ******** ******** *** ***** due to ******* trojans *** even ***** ** * ****** *** security ****** *** arise *** ** instances ** hacking * security ****** ** **** **** may ***** ** ** ********** **** **** *** ******** ***** and ****** **** *** sole objective ** ********* the ********* *********** This may ****** **** an electronic transaction is ***** ********** ******* ** al 2013) The ******* ******* *** ***** *** ******* ***** of *** ********** systemPreventive ****************** *** ********** ** ******** accounting ******* *** ** ******* *** ********** ** * virus ********** **** as **** ** ******* up ** authentication **** Authentication ****** when the systems **** login *** *** ********* **** ******** the true ******** of the user ****** access In *** accounting *********** ** is appropriate to keep the passwords ** **** ** the ethical policies of the ************ Violation ** *** of *** way threats ** computer accounting ******* *** ***** Accounting systems ****** ** set ** **** a *** **** *** request ** change ** ******** ******** ******* ***** ********** of ******** can ** **** to ****** **** **** ******* ***** **** access ** *** ******** ******* ****** ******** additional **** *** be through *** provision ** *** ******* in *** ********** department ******* ****** ***** ****** ***** This reduces ********* ** **** ****** *** as * ****** limit *** violent ************** and ******* attack ********* ******* to **** **** ** is essential **** the computers ** ********* from ******* ******* *** *** **** *** ****** *** ****** ******** ** ***** ******* that *** ******* **** the ****** and ****** ******** *** ********** offices *** connected ** *** internet *** ** ********** of the ******* from ******* *** ******* **** can ** ******** ******* *** use ** the ******** Researchers ****** that *** ***** ********** system *** be ******* **** **** ***** ** the ***** ** ******* or ***** *** *** ** anti-viruses ********* *** ***** ******** ******** *** ******* from ******* ****** (Wright ***** *** use ** virus protection ******* and authentication ********** can ****** ****** ** ** ********** ****** **** ***** ** ****** ********* to *** ********** measures ReportOne ** the ********** that * ****** *** **** **** the ****** ** ******* the replacement ** *** utility ******* **** *** ******* ****** The ******* manager ** usually ********* ** *** **** screen *** replacement **** *** ******* ****** gives ***** to *** *********** of ************* ********* ******* the person logging ** **** ******* **** **** * ******* ** ** *** may **** *** *** ********* *********** ** *** computer ****** ** ******* ***** without the ******* ** *** ************ *********** the company *** ******* losses ** the ******* ****** *** ****** *** be ******* (Wilding ***** **** ** * ***** ********** of *** ******* an ************ *** get *** ** ********* ** ************************* * B Steinbart * * **** * * ******** * ***** ****** * ****** ********** *********** ******* **** ************ ******** Pearson *************** * B ****** * & ****** * P ****** ******** ******* OF COMPUTERIZED BANKING ******* ****** *** ******************* IN ******** International Journal ** ********* *** ******* ******* 4(1) *********** C * ****** ** Patent ** ******* ********** *** ** ****** *** ********* ************* * ****** *********** **** *** security: ********** *** ************* workplace ******** ***** *********