Abstract
The objectives of the report are to investigate the perceived threats of computerized accounting information systems (CAIS) and to discuss how the impact of these threats can be reduced. The report covers the 19 perceived threats of CAIS, preventive controls, detective controls, corrective controls and auditors’ attestation of internal controls. Examples of controls given are authentication, authorization, physical access control, host and application hardening, encryption, training, log analysis, intrusion detection system (IDS), security testing, computer emergency response team (CERT), the role of Chief Security Officer (CSO) and patch management. The types of analysis used in the report are historical and qualitative
…show more content…
Authentication is about verification of the identity of the person or device attempting to access the system e.g. passwords, PINs, smart cards, ID badges, fingerprints and voice recognition. Authorization is about restricting access of authenticated users to specific portions of the system and specifying the type of actions they are permitted to perform e.g. access control matrix. Good physical access control should include stationing a receptionist or a security guard at the main entrance while locking the other entrances to the building, visitor sign-in form, monitoring all entry/exit points through CCTV, locking rooms with important servers with card readers, numeric keypads or biometric devices and storing encrypted sensitive data on removable media (Romney & Steinbart 2006).
Firewalls, antivirus software, user account management, sound software design to prevent buffer overflow attack i.e. an attacker sends a program more data than it can handle and disabling of unnecessary programs and features to reduce potential point of attack due to flaws contained in the programs and features are typical examples of host and application hardening. Encryption protects sensitive accounting data by transforming plaintext into ciphertext in which the intruder needs to decrypt to understand the
If some research is undertaken that provides evidence that capital markets do not always behave in accordance with the Efficient Market Hypothesis, does this invalidate research that adopts an assumption that capital markets are efficient?
SMW is a wholesaler of specialty micro-brewed beers. SMW purchases bottles and kegs of beer from small microbreweries in the New England area and sells them to local liquor retailers in Boston. SMW’s slogan is “Always in-stock, next day delivery.” Ted Stern, SMW’s owner and CEO, hopes to expand sales to outside of the Boston metro area within one year.
The same starting information will be accessed by PC from the memory gadget, the recovery of the information will be automatic and the speed of recovery will be a few times faster than that of the manual systems. The movement of the information in the accounting system is the first step, however, movement of information is not the catalyst for business opportunities; supplanting the system obliges customization as per the new system, nevertheless, the current information additionally should be moved into new system (Castle, 2008). The movement of the information does not bring new opportunities as it is expected after the computerization of the accounting systems. The new system will have distinctive risks, and the prerequisites will be diverse for the information operations and recovery. The inside controls will be distinctive, and the regulations will be diverse. The recovery of the information turns out to be simple and snappy due to the modernized systems. However, it has the dangers identified with the utilization of information for the reason other than that for which it was gathered. An employee is not supposed to use confidential information of other employees, and therefore confidentiality must be up held. Personal information should be kept classified and utilized just for the planned reason. The information assurance acts have confined the entrance of information by an unauthorized
Warren Company makes candy. During the most recent accounting period, Warren paid $3,000 for raw materials, $4,000 for labor, and $2,000 for overhead costs that were incurred to make candy. Warren started and completed 10,000 units of candy, of which 7,000 were sold. Based on this information, Warren would recognize which of the following amounts of expense on the income
ASC 410-20-25-8 indicates that an asset retirement obligation is estimable if all of the following exist:
1. This question addresses the effect of Microsoft’s software capitalization policy on its financial statements. Ignore any potential tax effects.
Assess the degree to which the firm’s accounting reflects the underlying business reality. Identify accounting distortions and evaluate their impact on profits and the sustainability of profits.
1. Tutti’s Sandwich Shop has the following information regarding costs at various levels of monthly sales. Help Tutti separate her costs into fixed costs and variable costs so that she can predict and evaluate costs at varying levels of guests served.
The accounting system we use today started in Venice in renaissance period over 520 years ago. The trade business increased hugely during this time and all the financial recordings had to be written down to help people see how their business is doing. During that time in 1494 the first book about was published in accounting by Luca Paciolli and was called “The Collected Knowledge of Arithmetic, Geometry, Proportion and Proportionality”. He was called “The father of Accounting” and most of his described principles have been used up until this day.
In this composition, we will be discussing two topics that go hand in hand when it is dealt with in tax accounting. To fully understand the scope of this article, passive activity is defined by the IRS as “any rental activity or any business in which the taxpayer gains income but does not materially participate in the activity”(IRS). Examples of passive activities can include equipment leasing and real estate leasing, in contrast to salaries, wages which are generally considered non-passive activities. As the article “Skip the dorm, buy your kid a condo” states, there are tax benefits when renting a property, but now individuals have exploited loopholes in the tax code that can be controversial and even illegal.
Information Technology (IT) is a foundation for conducting business today. It plays a critical role in increasing productivity of firms and entire nation. It is proven that firms who invested in IT have experienced continued growth in productivity and efficiency. Many companies' survival and even existence without use of IT is unimaginable. IT has become the largest component of capital investment for companies in the United States and many other countries.
only business activity is to sell pod racers imported from PD. ID pays a 20% import duty based on
1. A brief history of the two organisations, and their objectives, in as far as they
Corporations are often the victims of the most common white-collar crimes that occur in corporate America. According to the Association of Certified Fraud Examiners (cfenet.com), “abuse and fraud by employees cost U.S. organizations more than $400 billion annually…[which equals] $9 per employee per day.”
The aim of this report is to discuss the various methods of reducing computer fraud and to find out whether the computer security measures is necessary. In the main body of this report discuss about whether the