ACCT 415 University of Saint Joseph Cybersecurity Risks Essay

User Generated

efnyenfuvqv

Writing

ACCT 415

university of saint joseph

ACCT

Description

Auditing incorporates a research component to enable students to explore and write about topics related to auditing. I hope is that you can identify topics ( check the attached file) that you would enjoy researching and perhaps create a research outcome involving “untapped” or lesser-researched areas. 

You may not use papers from other courses, but you may take a previously researched business topic and then analyze it from an auditing-related angle. 


Unformatted Attachment Preview

Auditing 415 incorporates a research component to enable students to explore and write about topics related to auditing. With multiple lectures under your belt, the hope is that you can identify topics that you would enjoy researching and perhaps create a research outcome involving “untapped” or lesser-researched areas. You may not use papers from other courses, but you may take a previously researched business topic and then analyze it from an auditing-related angle. Write a min. 9 page (excluding title page and references) paper. While not required, students are encouraged to use APA formatting style. Students should have a minimum of 7 citations from 2005 or more recent. Relevant websites for student research and current events are: • • • • • • www.accountingweb.com – provides a weekly newsletter of current events and changes in the profession. There is free registration. www.aicpa.org – website of the American Institute of CPAs. www.picpa.org – website of the Pennsylvania Institute of CPAs. www.pcaob.org – website of the Public Company Accounting Oversight Board www.sec.gov – website of the Securities and Exchange Commission, which includes filings of public companies, SEC rules for public companies, a special section for accountants. https://scholar.google.com- Google Scholar APA Resource: https://widener.libguides.com/APA_7th/introduction Sample Topics Audit Risk Models – Effectiveness AICPA’s Center for Audit Quality PCAOB & Audit Quality Indicators Audit Quality (improvements, future initiatives) Conflicts of interest Legal concerns in Auditing Whistleblowing Sustainability & Green Initiatives AI or Emerging Technologies Cyber Security Risks Fraud Global issues & impacts Public Accounting Turnover Behavioral topics– cultural, gender, etc. aspects in auditing Audit committee effectiveness, concerns, etc. Business continuity Quality Control Related Party Transactions Future of Auditing Conflicts of Interest Internal Auditing Role, Effectiveness, etc. The list is endless…. Forensic Accounting-Audit Effectiveness Internal Controls AI or Emerging Technologies (Blockchain, Etc.) Strategic Planning SEC Independence Issues Going Concern Role or Effect of International Financial Reporting Standards 1
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

CYBER SECURITY RISKS

1

Cybersecurity risks

Name
Institution affiliate

CYBER SECURITY RISKS

2

Abstract
Cybercrime is described as any crime committed online or predominantly online, and it often
involves the hacking of communications systems or computers. Unpatched vulnerabilities and
bank fraud are examples of cyber warfare. Other types of cyberattacks include "sexual
harassment," posting spam, abuse, intimidation, and commercial sexual abuse. Terror groups
network online, bringing violent acts and attacks into the cyber world.
Most of the businesses are being interrupted by cyber-attacks which end slowing the daily
operations in a given company. It is the privilege of any business owner to have their businesses
being secure from any malicious cyber attack. Forces are pulling towards divergent directions
such as the criminals getting more rapidly and enhanced in making their terrorization fuse in
addition to the companies struggles due to critical and surplus security farm duties (Craigen et
al.., 2014). As confirmed by the 2016 economic crime survey, cyber felony takes the second
most reported economic attacker affecting approximately 32% of farms. As evidence of how the
current world is headed, internet crimes will no longer affect the firms due to how hard they are
being dealt with.
Weaknesses in any company's overall success can jeopardize its other immediate financial
condition and its long-term viability. According to The International State of Data Protection
Research conducted in the year 2017, businesses around the world are looking at possible
alternatives to their cyber risks. Such alternatives include installing full-service internet security
against viruses which helps in protecting the companies’ crucial information concerning private
and financial information when it is aired(Singer et al.., 2014). Integration appears to be the goal
that CSOs and CIOs are aiming for. Having all of the ducks in order will help to paint a better
image of security threats and vulnerabilities – which is a must-have. As a result, in this
tumultuous setting, businesses must urgently implement cybersecurity initiatives as a strategic
instrument. It's not only about technology; it's also about company sustainability.
A solution is always found if there is an existence of a problem. This is to indicate that any
running operation should be in a position to identify the source of the existing products so that
they could be able to perfectly deal with them using an appropriate mechanism. However, If you
are worried about the security of your company's properties, there are solutions available. That
the very first step is to recognize the inherent cyber threats that reveal your company to

CYBER SECURITY RISKS

3

organized criminals. For years to come, you'll want to prioritize information security in your
business strategy. It is important to have a solid plan in place to defend the company from cyberattacks. A performance management way to protect you deal with the fallout from a possible
breach of security is also important.
Any running farm should put in place data security is a subject that you should prioritize in your
business model for the foreseeable future. It is important to have a solid plan in place to defend
the company from cyber-attacks. A disaster recovery plan to deal with the fallout from a possible
data leak is also important. Here we have to discuss collections of cybersecurity cases without
considering any logic. Such mechanisms help come up with reliable solutions that improve a
company’s functioning on matters of cyber security.
Inability to protect safety fundamentals is the most popular glitches and techniques used by
hackers in the last year demonstrate a lack of essential cybersecurity steps. Since they don't need
anymore, cybercriminals use less than a dozen bugs to break into companies and their networks.
Something as easy as prompt patching might have prevented 78 percent of encoding genes in the
organizations studied (Gordon et al.., 2006). . This is also true for perceived security
vulnerabilities. Furthermore, depending solely on virus protection as a network device and
declining to secure software invites adversaries in.
Uncertainty about the sources of organizational cybersecurity threats the service providers also
fail to recognize “their vulnerability to attack, the importance of their essential assets, and the
silhouette or involvedness of possible attackers. This topic was discussed at the Economist
Intelligence Unit in 2015, and it is likely to remain significant for another few decades. However,
it is good to note that cybersecurity risks are not always meant to occur while also technology
being not only the security risk source (Mirkovic et al.., 2012). Aspects involving psychological
and sociological can be the greatest source of such a crime. Here the company needs to be n the
forefront in the way it handles and how it perceives cybersecurity.
Other companies may lack policies t...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags