Summary: The Accounting Information System

Superior Essays
Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
The accounting field has over past few decades witnessed a number of changes mostly due to increased advancement in technology level. There has been an improvement from paper-based journal and ledgers to a new level of accounting system that is completely automated (The WritePass Journal, 2012). The Accounting Information System commonly referred to as AIS is an automated system that is computer based is mostly used for tracking most of the accounting activities in relation to information technology resources. Most of these activities revolve around
…show more content…
The automated system carries with it some confidential data and information, which may be compromised if proper protection measures are not adhered to. These threats and risks are associated with both internal and external forces. However, in most instances this threats and risks have been greatly been linked with internal sources and mainly due to human doings rather than natural forces. A small mistake such as bad or accidental entry made by the employees may be attributed to causing enormous losses to the organization. In some other cases, this risks may be caused intentionally, where an employee knowingly inputs bad data with malicious and fraudulent motives of sabotaging the organization. Some of these threats can nevertheless be easily monitored, but the worst danger, in this case, may be the risk of system hacking. The consequences of hacking can be devastating, as it creates havoc in the accounting system and department raising the question on accuracy and the reliability of the …show more content…
The internal controls are very imperative when it comes to matters of safeguarding the privacy of information system. Putting in place internal controls is so important, and it is for this reason that application controls to safeguard accounting system as well as physical assets to prevent unauthorized access. There is the need to ensure that the accounting information is recorded or documented against the source document, and it must then be verified externally in case there are discrepancies. Through the sequence of discrepancies, the responsible team can be able to predict any cases of potential

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Accg/399 Task 1

    • 662 Words
    • 3 Pages

    Having the opportunity to learn ACCG 399 has allowed me to gain the most valuable and helpful experience throughout three years of Bachelor study. And what I have attained the most are from the study of social, institutional and accounting professional aspects. Throw back to the conventional explanation of accounting regarding its practical application in the corporation fields, it has been defined as the process of undertaking analysis, preparing and recording the financial information of a venture, with the intention to deliver useful guidelines to various uses in the decision making. Prior to undertake this unit, my comprehension of accounting were merely revolving around the technical perspectives relating to taxation, financial accounting…

    • 662 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Computerized tracking systems have the advantages of capturing disclosures for the entire entity based on the computer network being used. Also this method utilizes can easily locate records of disclosure and are able to print upon request. However, the use of any computer system are not always safe due to systems crashing or being hacked. On the other hand, manual logs have the advantage of tracking disclosures and information by written proof from the individual requesting PHI.…

    • 349 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Peregrine Fraud Case Study

    • 1216 Words
    • 5 Pages

    1) At Peregrine, the risk factors, especially those aligned with control environment factors and the “tone at the top” are discussed. The risks included having a paper based confirmation system for the entire business; no segregation of duties, which meant that only one or very few people were working on the financial statements, and in this case Mr. Wasendorf was the only one and had altered all bank documents using only Photoshop, excel, scanners, and printers. Continuing on, time off was not required at Peregrine, which could have ultimately discovered this fraud much earlier, by allowing someone else to sit in the absentee’s seat and review all of their work. Additionally, Peregrine lacked internal auditors or an audit committee at the time. The presence of the internal auditors could have decreased odds of misstatement incentives to commit fraud by management, called fraudulent financial reporting, and overseen…

    • 1216 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    Given your understanding of the history and status of Cenartech,make some general observations about the firm 's security readiness. Is Cenartech at low, moderate, or high risk of a security problem? On what aspects of the description do you base your assessment? Cenartech has invested a significant amount in it’s information technology infrastructure and I would rank it moderate in risk of security problems.…

    • 884 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    BACK-FLUSH ACCOUNTING Costing systems have been augmented to reflect the manufacturing philosophy that is based on the need to achieve competitive advantage. According to modern manufacturing philosophy, flexibility is important to provide the customers with their wants at an exact time whenever it is required so as to achieve competitive advantage. This defines Just-In-Time (JIT) system whose objective is to produce or procure products or components as to when it is needed. Backflush Accounting (BA) otherwise known as backflush costing is defined as a more simplified costing system for allocating costs between stocks and cost of goods sold.…

    • 1106 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    a. What is accounting and how does it help you manage your personal finance? b. Describe the three products of accounting and bookkeeping procedures that are most useful in personal financial planning. C. How could personal financial software assist you in your personal financial decisions? Accounting is one of those tools that make complex things like a huge sum and its breaking down through somehow diverse and seemingly unrelated activities look relatively easy to grasp to us as we strive to follow it basics principles before we get to its most difficult parts as people who stepped on the earth centuries before tried to do and as our descendants will testify about us and just as like we are doing right now . Investopedia defines accounting…

    • 1243 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cost Accounting Essay

    • 1292 Words
    • 6 Pages

    The use of accounting in the business field to measure an entity in many aspects regarding financial information is crucial in modern day. Tracking how a business obtain, spends, and invest their financial assets are key indicators for not only external users such as investors and creditors, but internal users such as management departments. To plan for future endeavors, one must understand their present capabilities. Through extensive research, we can establish why cost accounting is important to the success of the firm, various methods of cost accounting, and how they are used.…

    • 1292 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Financial Accounting and Managerial Accounting Financial accounting and managerial accounting are both used to deliver facts about the organization to a decision maker. Managerial accounting is often mentioned as “cost accounting”. This is the method of categorizing, calculating, investigating, understanding, and connecting data for determining the businesses goals. Managerial accounting and financial accounting vary in significant ways, managerial accounting is designed to assist managers in the business to make assessments, and financial accounting gives information to outside groups (“Managerial Accounting Definition | Investopedia,” n.d.).…

    • 822 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Upon the completion of this course I have come across topics that have interested me and increased my knowledge especially in the financial and accounting aspect. This course has introduced me to understanding the relationship between financial and accounting in making an effective strategic decision. In as much they sound alike they are different and used in different purposes, both accounts are important to the business but are used for different purposes. Financial statements are requirement for any organisation and are published at the end of a financial period for its stakeholder, shareholder and customers to see, they show reports of performance on a historic basis and what has been achieved over the years. At the time the statement is…

    • 1536 Words
    • 7 Pages
    Superior Essays