Liability Of A Company In The Event Of Attack On Accounting Information System Essay

¶ … companies be held liable? The issue of whether firms should be held responsible for losses sustained for external attacks on their AIS (accounting information systems) has recently come into sharp focus. On one hand, if a firm has put in place sufficient security measures, then in that case they shouldn't be held liable for any losses incurred in an external attack on their AIS. On the other hand, if a firm is negligent and has failed to put into adequate security controls, then they ought to be held liable for any losses incurred in the event of a successful security attack on their accounting information systems. There are quite a number of different types of attack that can enable access to accounting information systems (AIS), and if a company does not put measures to protect themselves against those attacks, then in the event of a successful attack the relevance and/or reliability of the financial information will be destroyed (Beard & Wen, 2007).

It is my opinion that in the event of a successful attack on a firm's financial systems, lawsuit(s) should be filed against the company. It is the responsibility of every organization to make sure that their AIS are protected against any form of unauthorized external access. On those grounds, every organization should ensure the credibility of their accounting information systems at all times. This paper fully supports the argument that organizations should be held legally...

...

Organizations should make sure that users' information is secured from unauthorized access, and they should also always make sure that any unauthorized disclosures of confidential information are prevented and/or fought by all means possible. Organizations should also put in place monitoring systems to regularly check their systems to prevent any kind of threats. Firms should also strive to encrypt all their accounting financial information before storage so as to make it hard for any unauthorized user to know the kind of data they have. Where appropriate, organizations should put in place strict access control systems so as to restrict the number of people who have any form of access to their AIS (Layton, 2007).
It is an organization's duty to choose the proper technical, administrative or physical controls on its financial information. Administrative controls serve three main purposes: to screen employees, to disseminate security control policies, and to regularly conduct employee awareness programs. The administrative controls and the technical controls ought to be incorporated in such a manner that any unauthorized users and hackers have only very minimal chances of…

Sources Used in Documents:

References

Beard, D., & Wen, H. J. (2007). Reducing the Threat Levels for Accounting Information Systems. CPA Journal, 77(5), 34.

Layton, T. (2007). Information Security Design, Implementation, Measurement and Compliance. Boca Raton, New York: Auerbach Publications, Taylor & Francis group.

Peltier, T. R. (2001). Information Security Risk Analysis. CRC Press.

Schneier, B., & Miller, C. (2002). In: Successful Attacks on Accounting Information System. Retrieved from: http://top-***.com/essays/Analysis/successful-attacks-on-accounting-information.html


Cite this Document:

"Liability Of A Company In The Event Of Attack On Accounting Information System" (2015, September 25) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/liability-of-a-company-in-the-event-of-attack-2154682

"Liability Of A Company In The Event Of Attack On Accounting Information System" 25 September 2015. Web.20 April. 2024. <
https://www.paperdue.com/essay/liability-of-a-company-in-the-event-of-attack-2154682>

"Liability Of A Company In The Event Of Attack On Accounting Information System", 25 September 2015, Accessed.20 April. 2024,
https://www.paperdue.com/essay/liability-of-a-company-in-the-event-of-attack-2154682

Related Documents

Information System holds in Accounting Industry's future? Looking through the glass and estimating what the future holds for any individual or profession is always a difficult exercise as the trends in any business or profession may change and so the path of development. It is better to look at the experience of some companies whose systems have changed over the past few years and thus try to estimate what is

Finance and Accounting Application that provides finance and accounting operations require all the possible computer security measures to be adopted. In this case, two patterns call for an incident response plan: The company's computer networks and systems are at a higher risk to threats like intrusions, computer viruses and exposures Computers are widespread through the company; the company depends heavily on computers and cannot afford service denial Therefore, the following security incidents

ERP and Information Security
PAGES 26 WORDS 8373

ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been

Role-based ERP systems are critical for the siloed, highly inefficient architectures of legacy ERP systems to be made more relevant, contribute greater financial performance, and lead to higher levels of overall customer satisfaction. c. Purpose of the study The purpose the study is evaluate how enterprises who adopt role-based ERP system implementations are able to attain higher levels of financial and operations-based performance vs. those that rely on silo-based, more functionally

Reject Shop -- Recent Events (January 1st, 2010 -- March 31st, 2011) EVENT 1: Publication Date: February 16th 2011 -- Impact of floods on sales The Reject Shop issued a statement declaring uncertainty regarding the aggregate cost of the floods and whether 100% of costs are reimbursable by insurance coverage and indemnity. The company's operations in Victoria and in Queensland Australia have been adversely effected. With working capital at a premium, according

awarding audit contracts by U.S. government departments and agencies Audit Management Red Rationale for and Objectives of the project main and secondary Desktop or literature search Rationale for Search Methodology LITERATURE/DESKTOP RESEARCH Authoritative sources Desktop Findings Justification for audits Evolving role of auditors Types of audit contracts Understanding the Audit Process Best practices and benchmarking Terminology Case Studies Audit management is a fundamental element in government accountability, control and performance management. Certainly there is justification within the Federal government to conduct audits of contracts for the