By Group B Jessica George Stephanie Williams Maria L. Moya Rekeisha Scott Alberto Camacho.

Slides:



Advertisements
Similar presentations
The Revenue Cycle: Sales to Cash Collections
Advertisements

Information Security Management Chapter “We Have to Design It for Privacy and Security.” Copyright © 2014 Pearson Education, Inc. Publishing.
Alberto Camacho Jessica George Maria Moya Rekeisha Scott Stephanie Williams Group B:
Computer Fraud Chapter 5.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Information Security Management Chapter “We Have to Design It for Privacy and Security. ” Tension between Maggie and Ajit regarding terminology.
Using Your Knowledge – Security Threats
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
The Islamic University of Gaza
Information Security Management
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
1 An Overview of Computer Security computer security.
Principles of Information Security Kris Rosenberg, Chief Technology Officer Oregon State University College of Business Kris Rosenberg, Chief Technology.
Chapter 12 The Revenue Cycle: Sales to Cash Collections Copyright © 2012 Pearson Education 12-1.
Chapter 12 Information Security Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Objectives of Internal Controls Protect the firm’s assets Ensure reliability of accounting records Promote operating efficiency Ensure adherence with management’s.
No Thanks, I’ll Use a Spreadsheet
Security MIS 171 – Web Technologies and Innovation Paul F. Clay, Ph.D.
Overview of IS Auditing n Need for control and Audit of Computers –Org cost of data loss –cost of incorrect decision –Value of hardware, software, personnel.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 12 Information Security Management.
Computer Crime and Information Technology Security
Measures to protect files from unauthorised access and modification Your name and surname Communication Skills ICT Skills Welsh Language.
HIPAA PRIVACY AND SECURITY AWARENESS.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 12 Information Security Management.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Information Security Management
Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Reporting and Interpreting Sales Revenue, Receivables, and Cash Chapter 6.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
MODULE 12 Control Audit And Security Of Information System 12.1 Controls in Information systems 12.2 Need and methods of auditing Information systems 12.3.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
COPYRIGHT © 2008 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license.
PowerPoint Presentation by Charlie Cook The University of West Alabama Copyright © 2006 Thomson Business & Professional Publishing. All rights reserved.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
INTERNAL CONTROL AND CASH CHAPTER Identify the principles of internal control activities 2. Explain the activities that help achieve internal control.
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
CONTROLLING INFORMATION SYSTEMS
1 CHAPTER 5 - b INTERNAL CONTROL OVER FINANCIAL REPORTING.
GLENCOE / McGraw-Hill. The General Journal and the General Ledger.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
The Costs and Methods of Obtaining Credit Morgan Napier and Kaitlin Nelke.
Welcome to the ICT Department Unit 3_5 Security Policies.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Multiplication Timed Tests.
Information Security and Privacy in HRIS
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Securing Network Servers
Add video notes to lecture
Liberty International Underwriters
Chapter 5 Electronic Commerce | Security
The Revenue Cycle: Sales to Cash Collections
Managing the IT Function
Computer-Based Processing: Developing an Audit Assessment Approach
Chapter 5 Electronic Commerce | Security
Computer Security Class 1
NHTCA New Tax Collector Training Series
INFORMATION SYSTEMS SECURITY and CONTROL
Manage Your Cash Flow.
Your Credit and the Law Chapter 27 5/24/2019.
Well Come To Our Presentation Accounting Information System Topic: Report on Revenue Cycle.
Presentation transcript:

By Group B Jessica George Stephanie Williams Maria L. Moya Rekeisha Scott Alberto Camacho

Figure 12: 1

 A Local Work Studio  A Neighboring Accounting Firm  A Dentist’s Office  A Honda Dealership

 Faulty service – procedural mistakes. The gym could incorrectly be billing the customers or having the wrong information under another customer.  Incorrect data modification – hacking computer crime. Someone can purposely be hacking into the system and altering important information about a customer like their membership fee.  Unauthorized data disclosure – pretexting. Someone can pretend to be a member of the gym and get in to workout.

 The three most serious threats to a neighborhood Accounting Firm IS:  Ineffective accounting controls: The firm should be able to process the financial data correctly and also be sure that recording the inventory of assets, such as products and equipment, companies should ensure separation of duties and authorities and have multiple checks and balances in place.  Hacking: Criminals tend to invade into computer networks to obtain critical data or to manipulate the system for financial gain.  Procedural mistakes: Placing incorrect information, such as incorrect price change on company web site or a company portal.

 Most of the problems would be by human error. There can’t be any natural disasters, that’s more for the car dealership.  The first and most important threat would be Incorrect data.  1. Incorrect data modification such as- Procedural mistakes, incorrect procedures, ineffective accounting controls, and system errors.  The second one would be  2. Denial of service- Accidents  3. It would have to be Faulty service- Such as procedural mistakes, Development and installation errors.

 Unauthorized data disclosure: Human error when someone inadvertently releases data in violation of policy.  -Faulty service: Problems that result because of incorrect system operation, incorrect data modification  -Denial of service: Human error in following procedures or a lack of procedures