Verified Document

AIS Attacks And Failures Who To Blame Research Paper

Accounting Information Systems Decisions of managers heavily rely upon the effective information systems (Srinivas and Gopisetti, 2012). Accounting Information Systems contain confidential data of the company; this information can be accessed by the outside sources through a successful Accounting Information System attack. Management is the top on the priority list, being held responsible for security of the Accounting Information systems, because the establishment and maintaining of these Accounting Information Systems resides under them. No doubt, that information security is the technical subject but the responsibility of the security is the top management's issue.

It is the responsibility of the senior management and accountants of the firm to work in cooperation with IT department and enforce adequate security measures to prevent the accounting systems. A considerable amount of budget and time should be allocated for securing and controlling these systems so that there are fewer chances of attacks from outsiders.

The problem is that the management considers Accounting Information Systems as a onetime expense, which is a wrong approach. These systems need regular updating and maintenance by IT managers in coordination with the firms' senior management. Managements that do not consider this issue seriously and try to reduce expenses by not updating the systems, suffer from AIS attacks.

The liability is usually on the party who acted in negligence that can be either the IT department...

Parts of this document are hidden

View Full Document
svg-one

Therefore, firm's management should be held liable for the losses, as it is solely responsible for selection and application of internal controls to prevent accounting system from outside sources and other risks attached to it.
2.

Senior Management, Accountants and IT Managers are responsible not only for establishing but also for maintaining the internal controls. They should discuss and plan together the program upgrading, changes, operations and security control so that the confidential information in the Accounting Information System remains secure.

If the senior management was inform about, the threats and it did not approve the budget for improving and upgrading the Information Technology Security and Control System, than it should pay for the losses incurred by the company. However, if the IT senior managers confirmed that the Accounting Information System was secure and considered it a challenge for someone to get access to the confidential data, than the IT, team should be blamed and should pay for the losses incurred by the company due to outsider attack.

Sometimes, the losses incurred are by leak of information need thorough investigations. For instance, consider case of an employee, who recently resigned from the organization and joined the competitors' firm. It is the responsibility of the HR to inform the IT personal regarding his departure so that all the access provided to the employee is ceased. If the HR forgets to inform the IT…

Sources used in this document:
References

Knapp, K., Marshall, T., Rainer, K., and Morrow, D. (2006). "The Top Information Security Issues Facing

Organizations: What Can Government Do to Help?" Information Security and Risk Management .Sept-Oct

Mukherjee, B . Heberlein, L and Levitt, K.. (1994). "Network Intrusion detection," IEEE Network, Vol.8, No.3.

Srinivas, G and Gopisetti, R. (2012). Accounting Information System (AIS), A Conceptual Study. Indian Streams
Cite this Document:
Copy Bibliography Citation

Related Documents

Attacks on Pearl Harbor and the World
Words: 8509 Length: 27 Document Type: Term Paper

Attacks on Pearl Harbor and the World Trade Center had similar historical events surrounding each attack. Franklin Delano Roosevelt and George W. Bush used similar policies to combat further attacks and unite the nation The paper highlights the entwined American reactions to the September 11 attacks and the Pearl Harbor attacks. The paper illustrates the similarities in which the over-prevailing backgrounds of each event created reactions to the devastating measures that

Attack on Pearl Harbor Lessons
Words: 973 Length: 3 Document Type: Essay

Yamamoto noted that "the war would continue for several years, our supplies would be exhausted, our ships and arms would be damaged and ultimately we would not be able to escape defeat." (Akira, 1990, pp.133-134). Masaru (1990) added that another difficulty between the two nations was America's attitude during the U.S.-Japanese negotiations on the eve of the outbreak of war. In particular, Masaru points to the hard line position of

Attack of the Butterflies Mark
Words: 1763 Length: 5 Document Type: Essay

The trick is not to focus on any of this, but to focus on preparation and then on the real thing. Do you think you're afraid to talk in front of other people? Guess what? The average person says 15,000 words per day. Unless you're in solitary confinement, those words are spoken to other people, sometimes two, three or more at the same time. You speak to family, friends, fellow

Attack in 2001 Was in
Words: 3433 Length: 10 Document Type: Term Paper

Such an attitude is part cultural clash and part resp0onse to external events, but it fosters a way of thinking that only leads to more conflict over time. U.S. support for Israel is often cited as the key element in explaining Islamic hatred of America, but that is only one element. The way the U.S. fails to understand Islam is another element that creates tension. Also, actions such as those

Attack of 911 Has Posed a Serious
Words: 4017 Length: 10 Document Type: Term Paper

attack of 911 has posed a serious threat to the aviation industry. For the first the world could realize that airplanes are not only the mode of transportation but can also be utilized as potential bombs. Many passengers are apprehensive of air travel. This led Governments, Policy Makers, aviation industries and regulatory authorities to think a while about aviation security. The aviation security is being revolutionized since then to

Attack Causality in Internet-Connected Cellular Networks, Internet...
Words: 796 Length: 2 Document Type: Essay

Attack Causality in Internet-Connected Cellular Networks," internet infrastructure security researchers Patrick Traynor, Patrick McDaniel and Thomas La Porta address the convergence of telecommunication and internet networks, and "how the architecture of cellular networks makes these systems susceptible to denial of service attacks" (2007). Rather than attribute the threat posed by denial of service attacks to the oft cited cause of limited bandwidth capability, the authors contend that telecommunication and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now