Verified Document

Security Threats Explain Companies Held Liable Losses Essay

Security Threats Explain companies held liable losses sustained a successful attack made accounting information system sources. The paper APA style includes -text citations sources.

Liability for losses in successful attack made on their accounting information system

"One of the fastest-growing threats on the Internet is the theft of sensitive financial data" (Beard & Wen 2007). The greater the amount of sensitive financial data available online, the greater the risk for the organization. "Failure to include basic information security unwittingly creates significant business and professional risks...With the expansion of computer technology, traditional business processes have been restructured and unique internal control techniques are required to address exposure to many new dangers" (Beard & Wen 2007).

New laws have placed additional security burdens upon managers, regarding the handling of sensitive financial data. "Management's responsibilities include the documentation, testing, and assessment of internal controls, including relevant general IT controls...and appropriate application-level controls designed to ensure that financial information generated from an organization's information system can be reasonably relied upon" (Beard & Wen 2007). Common threats...

The Foreign Corrupt Practices Act of 1977 and the Sarbanes-Oxley Act of 2002 (SOX) demand that the organization ensure that records are maintained in an accurate fashion and in accordance with GAAP (generally accepted accounting principles) and that they prevent unauthorized use and disposal of records (Beard & Wen 2007). SOX does not create a mandatory, uniform system of compliance and documentation but the company by law must create a feasible system of internal controls to protect clients. Thus, organizations cannot simply buy accounting software on faith and use its failure as an excuse in light of a security breach, nor can it assume its accountants will find any errors or breaches. While "SOX prohibits auditors from offering information system design and implementation services to audit clients, SOX mandates that every independent audit report include an auditor attestation report relating to the internal control assessments made by management" (Beard & Wen 2007).
Until recently, the trend in…

Sources used in this document:
References

Beard, Deborah & H. Joseph Wen. (2007). Reducing the threat levels for accounting information

Systems: Challenges for management, accountants, auditors, and academicians.

CPA Journal. Retrieved: http://www.nysscpa.org/cpajournal/2007/507/essentials/p34.htm

Clifford, Robert. (2002). Accountant's liability. Clifford Law Firm.
Retrieved: http://www.cliffordlaw.com/news/attorneys-articles/archive/accountants2019-liability
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Decision Support System DSS
Words: 3582 Length: 10 Document Type: Research Proposal

Decision Support System (DSS) Assuring a safe and secure it (IT) atmosphere for that exchange of business has been a significant problem. The degree related to the task has been increasing annually, as assailants become a little more well-informed, more driven, and more vivid within their endeavours. Based on a lead security professional at International Data Corporation, a worldwide supplier of marketplace data and advisory services to the IT network, "Rising

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now