Case Study Of Hacking The AIS

Superior Essays
Register to read the introduction… Organizations posses a lot of information, including strategic plans, trade secrets, cost information, legal documents, and process improvements. Of course, preserving the confidentiality the organization’s intellectual property is the basic objective of information security. Protecting the privacy of their customers’ information is also equally important. That means a company and its management team is also responsible in protecting confidentiality and in implementing privacy controls. If they fail in these roles as well as the roles enumerated above, they should be held accountable for the failure or for the successful attack made on their AIS.
Therefore, as the above analysis shows, a company and its management team should be held liable for losses sustained in a successful attack made on their
…show more content…
Therefore, the federal government should have deciding and enforcing remedies and punishment in such cases. There are also some other privacy related regulations. These regulations were passed by Congress in order to protect privacy violations and in response to accounting information system attacks.
In addition to the CAN-SPAM Act discussed above, a number of federal regulations, including the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and the Financial Service Modernization Act impose specific requirements on organizations to protect the privacy of their customers’ personal information (Romney & Steinbart, 2012). Therefore, these are some of the other cases where the federal government should have deciding and enforcing remedies and punishment with regard to violations in accounting information system.
Evaluation of AIS (with Respect to

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Eco/372 Week 1

    • 491 Words
    • 2 Pages

    Based on the organization you have chosen for your final research paper, respond to the following: I. Regulations: If any data involved is regulated, or if there are other legal and compliance concerns, state them in this section. The laws covering the internet are varied and quite complex in the United States with the financial system to the medical system heavily regulated. Starting off the Sarbanes-Oxley was enacted in 2002, the Sarbanes-Oxley Act is designed to protect investors and the public by increasing the accuracy and reliability of corporate disclosures. It was enacted after the high-profile Enron and WorldCom financial scandals of the early 2000s.…

    • 491 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    An expansionary policy Act signed during the 80’s that is still in place today is the Monetary Control Act of 1980. This Act consisted of 2 parts, which also includes the Depositary Institution Deregulation of 1980. Prior to the approval of this act, only the banks associated with the Federal Reserve were mandated to report deposits from the public and had a regulated interest rate, which placed them at a huge disadvantage due to the fact that the public was opting towards mutual funds in order to increase savings. As mentioned in the World Public Library (2016), the approval of this Act allowed for all the banks in the nation to report deposits, to charge any interest for loans and increased the deposit insurance from $40,000 to $100,000.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It forces Chief Executive Officers (CEO) and Chief Financial Officers (CFO) to be held personally accountable for the comprehensiveness and accuracy of any financial reports and recorded documentation. Although these laws require transparency and different levels of security for each organization they govern, they are all required to report a data breach to a law enforcement agency. Investigations into breaches could lead to possible apprehension and incarceration of the individual or individuals responsible for the attack (Whitman & Mattord, 2014, pp.…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    1.Examine the types of decisions financial managers make. How are these decisions related to the primary objective of financial managers? There are three major decisions that financial managers have to take on a regular basis. One of them is the investments decision, the financial manager has to decide where to best invest the funds of the company. It is beneficial for the company to invest their funds to keep growing.…

    • 1110 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    V-Care Security Solutions

    • 150 Words
    • 1 Pages

    V-Care Security Solutions We live in a society with a perceived threat from numerous sources. These threats are now a reality that faces us on a daily basis. We are put through metal detectors as we enter airports, multiplex or malls. Our society must be shielded from planned and random incidents that threaten to throw our fast pace of life out of gear.…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Fraud Under Section 1030

    • 674 Words
    • 3 Pages

    The CIA provides the clients with assurance of security services and guides policies for information security within an organization. When these three are compromised it results in reason consequences and it is punishable under the United States Justice Law. When there is loss of data, the availability of guaranteed reliable access to information by authorized people is nonexistent. Moreover, the integrity of the information whether it’s trustworthy or accurate after such intrusion requires verification and costs money to run certain forensic testing. Hence, when CIA is compromised such intruder must be punish severely for thousands of highly sensitive data is under…

    • 674 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The Patriot Act

    • 596 Words
    • 3 Pages

    The Patriot Act was passed after the terrorist attacks of September 11, 2001. This act allows the government and or federal officials to track and intercept our communications with one another. It also makes new crimes, punishments, and new procedures that we use for terrorists. The history of the Patriot Act, the abuse of our civil liberties, and the current issues with the act lead Americans to feel like they cannot trust their government.…

    • 596 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Korn/Ferry V. Case Study

    • 1058 Words
    • 4 Pages

    FACTS: David Nosal was a self-employed entrepreneur who opened a business mimicking his former employer Korn/Ferry’s business strategy. Korn/ Ferry operated an executive search firm, which employed several workers, who were given access to the company computer systems with the use of log in credentials. This granted employees access to critical business information, such as names and contact information for clients and others. Nosal, now a direct competitor of Korn/Ferry, asked some of Korn/Ferry employees to use their computer privileges, to access and obtain pertinent information, then supply the information to him in order to gain a competitive edge. Further, Korn/Ferry had a previously established policy in place, which prevented employees…

    • 1058 Words
    • 4 Pages
    Great Essays
  • Great Essays

    privacy. State lawmakers have dealt with an array of privacy issues related to online activities. This web page documents state laws in a limited number of areas: website privacy policies, privacy of online book downloads and reader browsing information, personal information held by Internet service providers, online marketing of certain products directed to minors, and employee email monitoring. Additional digital privacy resources also are available from NCSL.…

    • 1793 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays