Tuesday, January 7, 2020

Hacking Identity Theft and Information Essay - 1538 Words

Hacking the AIS By Helen Tewolde ACC 564 Thomas Wood Introduction This paper will discuss accounting information system attacks and failures: who to blame. I am also going to discuss the following related topics in the following order: Firstly, I will take a position on whether a company and its management team should or should not be held liable for losses sustained in a successful attack made on their AIS by outside source. Secondly, I will suggest who should pay for the losses, to whom, and state why. Thirdly, I will give my opinion regarding the role, if any; the federal government should have deciding and enforcing remedies and punishment. Finally, I will evaluate how AIS can contribute or not to contribute to the†¦show more content†¦Therefore, as the above analysis shows, a company and its management team should be held liable for losses sustained in a successful attack made on their AIS by outside sources. The Organization should Pay for the Losses As it was mentioned above, a company and its management team should be accountable for the losses sustained in a successful attack made on their AIS by outside sources. All employees and management team belong to the company they work for. Therefore any failure by the management team or employee is the failure the company or the organization as whole. Particularly, the breach of security and violation of privacy has always very serious consequences on organizations. The two major privacy related concerns are spam and identity theft. Spam is unsolicited e-mail that contains either advertizing or offensive content. Spam not only reduces the efficiency benefits of email but also is a source of many viruses, worms, spyware programs, and other types of malware. To deal with this problem, the US Congress passed the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act in 2003. According to Federal Trade Commission (FTC), each separate email in violation of the CAN-SPAM Act is subject to penalties of up to $16,000. Identity Theft is the unauthorized use of someone’s personalShow MoreRelatedCyber Crime: Preventing the Horrific Crimes on the Inernet1649 Words   |  7 PagesInternet Cyber Crime, including fraud, identity theft, stalking, and hacking is a growing problem which can be prevented by taking the proper precautions. I. Background II. Cyber fraud A. Fraud sites 1. Free trials sites 2. Craigslist B. Preventing fraud 1. Personal information 2. Credit cards III. Identity theft A. Identity theft sites 1. Stealing information 2. Craigslist B. Preventing Identity theft 1. Who to give information to IV. Cyber Stalking A. StalkingRead MoreHow ATM Hacking Affects Business in the U.S Essay878 Words   |  4 PagesATM hacking has become more and more prevalent in society today. The more technology improves the more fraud is done. The U.S alone, has fallen victim to ATM hacking over the last decade. There has been countless numbers of ATM hacking taking place, having billions of dollars loss and innocent people now in debt. ATM hacking has really proved to be effective and has become a major success for criminals. In the article, â€Å"Hackers Devise Wireless Methods for Stealing ATM Users PINs†, author JordanRead MoreCyber Criminals: Cyber-Crime and Cyberstalking Essay1422 Words   |  6 Pagesa different level, stalkers can leave long term effects on their targets and get away with it effortlessly. Additionally, identity theft is causing people millions of dollars and there are very few ways to track people down. All of these crimes can be done by any person in almost any location. Cyber-crimes negatively affect society due to hacking, stalking, and identity theft. Criminals develop along with technology. Once the Internet came out, people found ways to exploit it. For example, a manRead MoreThe Importance of Cyber Security1093 Words   |  4 PagesInternet is a growing source for communication. With so many people online, many have figured out ways to steal from others. Whether it be their Identity, money, or self a-steam, many are ripped of their belongings through the internet. Email and instant messaging are an easy way to not only communicate but send along important Information to one another. The newest and one of the most used, is social media websites, or a website that a profile is created and one can share pictures, thoughts, andRead MoreTechnology and Identity Theft1176 Words   |  5 Pagesinternet to allow for an accurate and safe resource for information. But to their dismay they are wrong the internet does not always allow for safe access to information. It can also be capable of harming society greatly. Everyday society ente rs personal data into the internet for example credit card information, Social Security information, and other personal information, which are all traveling through the entire internet. All this information is traveling through the internet capable of travelingRead MoreSecurity And Risks Of Information Systems Essay1268 Words   |  6 Pages Most significant IS security and risk issues Information systems have developed rapidly over time and are being relied by more people. With the increasing reliability of Information Systems, businesses have adopted them a lot. Companies or businesses using Information System have an advantage in competitiveness and efficiency (Hilton, 2013). AIC uses an IS in its activities to enhance communication and collaboration. Due to the wide use, Information Systems have become an important part of everydayRead MoreThe Assembly Bill 32 : Computer Crimes Introduced By Assembly Member Waldron1339 Words   |  6 Pagespenalties for any violation and those are subjected to fines and imprisonment. This bill has been created by the advanced number of high tech computer criminals that have increased their capabilities to attack large retail stores, steal people’s identity, hacked the White House website, and even the California Department of Motor Vehicles computer system. As technology continues to advance over the years, people, busi nesses, and even governmental agencies have been affected by computer criminalsRead MoreTechnology And Its Effect On Society1234 Words   |  5 PagesIn today’s day, technology has literally evolved into everyone daily lives. The vast amount of information and capabilities now are endless in almost every aspect of life. More and more we are becoming dependent on it and it functioning for us. People now basically lose their minds if their internet connection goes down or they cannot access their Facebook account. Our daily errands from paying bills or going to the bank to depositing checks can now all be done by a snap of a picture or a click ofRead MorePotential Risk to an Organisation of Committing to an E-Commerce System.717 Words   |  3 Pagesorganisation of committing to an E-commerce system. E-commerce has many drawbacks. I will be going through these drawbacks that risk an organisation of committing to an E-commerce system. * Advertising and maintaining website * Hackers * Identity theft * Website not being recognised * Viruses * Profit * Delivery Advertising and maintaining website A drawback of an Ecommerce is the advertising. If no-one knows it exists it will not generate any revenue. Of course the mostRead MoreEthics in Technology Essay1555 Words   |  7 Pagesto invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns and identity theft are two ethical issues that increase with the rapid

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.