Week 4 assignment and discussion question. Please number each answer as it pertains to the question.
Assignment 2: Hacking the AIS
In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.
For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked.
Write a five page paper in which you:
1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
4. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Week 4
DISCUSSION QUESTION
· 1A. Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire of being a dominant player in the global market.
· 1B.As the CFO, describe your top-three fears in competing in the global market, and how you plan to overcome those fears. Provide support for your rationale.
· 2A.In this global age of information, suggest which threats are posed to the principles of confidentiality and privacy, related to offshore outsourcing of various information systems functions. Provide support for your rationale.
· 2b.Determine who should be held liable for any breaches that occur, and indicate the course(s) of action that should be taken.


0 comments