• Home
  • /
  • Topic
  • /
  • Law
  • /
  • Liability
  • /
  • Liability of a Company in the Event of Attack on Accounting Information System Essay
Verified Document

Liability Of A Company In The Event Of Attack On Accounting Information System Essay

¶ … companies be held liable? The issue of whether firms should be held responsible for losses sustained for external attacks on their AIS (accounting information systems) has recently come into sharp focus. On one hand, if a firm has put in place sufficient security measures, then in that case they shouldn't be held liable for any losses incurred in an external attack on their AIS. On the other hand, if a firm is negligent and has failed to put into adequate security controls, then they ought to be held liable for any losses incurred in the event of a successful security attack on their accounting information systems. There are quite a number of different types of attack that can enable access to accounting information systems (AIS), and if a company does not put measures to protect themselves against those attacks, then in the event of a successful attack the relevance and/or reliability of the financial information will be destroyed (Beard & Wen, 2007).

It is my opinion that in the event of a successful attack on a firm's financial systems, lawsuit(s) should be filed against the company. It is the responsibility of every organization to make sure that their AIS are protected against any form of unauthorized external access. On those grounds, every organization should ensure the credibility of their accounting information systems at all times. This paper fully supports the argument that organizations should be held legally...

Organizations should make sure that users' information is secured from unauthorized access, and they should also always make sure that any unauthorized disclosures of confidential information are prevented and/or fought by all means possible. Organizations should also put in place monitoring systems to regularly check their systems to prevent any kind of threats. Firms should also strive to encrypt all their accounting financial information before storage so as to make it hard for any unauthorized user to know the kind of data they have. Where appropriate, organizations should put in place strict access control systems so as to restrict the number of people who have any form of access to their AIS (Layton, 2007).
It is an organization's duty to choose the proper technical, administrative or physical controls on its financial information. Administrative controls serve three main purposes: to screen employees, to disseminate security control policies, and to regularly conduct employee awareness programs. The administrative controls and the technical controls ought to be incorporated in such a manner that any unauthorized users and hackers have only very minimal chances of…

Sources used in this document:
References

Beard, D., & Wen, H. J. (2007). Reducing the Threat Levels for Accounting Information Systems. CPA Journal, 77(5), 34.

Layton, T. (2007). Information Security Design, Implementation, Measurement and Compliance. Boca Raton, New York: Auerbach Publications, Taylor & Francis group.

Peltier, T. R. (2001). Information Security Risk Analysis. CRC Press.

Schneier, B., & Miller, C. (2002). In: Successful Attacks on Accounting Information System. Retrieved from: http://top-***.com/essays/Analysis/successful-attacks-on-accounting-information.html
Cite this Document:
Copy Bibliography Citation

Related Documents

ERP and Information Security
Words: 8373 Length: 26 Document Type: Term Paper

ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

How to Perform Valuations for Municipalities in South Africa
Words: 64599 Length: 254 Document Type: Dissertation

……South African Municipalities Municipal Revenue Loss Reduction through Improved Municipal Valuation Methodologies:Balance Sheet Enhancement of South African Municipalities to Improve Rates and Taxes Revenue GenerationAbstractThis study examines the property valuation process of Municipalities in South Africa and develops a strategy for strengthening that process in order to more efficiently value properties and ultimately to enhance municipal balance sheets and increase revenue streams. This study proposes an innovative valuation method based

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Cloud Computing and Computing
Words: 7745 Length: 25 Document Type: Thesis

Risk, Risk Management Strategies, and Benefits in Cloud Computing SITUATIONAL ANALYSIS PREMISE STATEMENT KEY DEFINITIONS SERVICE AND DEPLOYMENT MODELS BENEFITS OF CLOUD COMPUTING SECURITY ASPECTS Storage Reliability Virtualization Trust Physical Security Legal Compliance CLOUD COMPUTING RISKS RISK Management STRATEGIES Vendor Evaluation Centralized Information Governance Other Organization-Level Measures Individual-Level Security Measures Cloud computing model Cloud computing service and deployment models ISO/IEC broad categories The emergence of cloud computing has tremendously transformed the world of computing. Today, individuals, organizations, and government agencies can access computing resources provided by a vendor on an on-demand basis.

ERP Systems Challenges of Enterprise
Words: 22297 Length: 81 Document Type: Dissertation

Role-based ERP systems are critical for the siloed, highly inefficient architectures of legacy ERP systems to be made more relevant, contribute greater financial performance, and lead to higher levels of overall customer satisfaction. c. Purpose of the study The purpose the study is evaluate how enterprises who adopt role-based ERP system implementations are able to attain higher levels of financial and operations-based performance vs. those that rely on silo-based, more functionally

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now