Access Millions of academic & study documents

Threats To Computerized Accounting

Content type
User Generated
Subject
Accounting
Type
Homework
Showing Page:
1/3
Surname 1
Student’s Name
Professor
Course
Date
Threats to Computerized Accounting
A study on the threats to computerized accounting in Jordan studies the main threat to
computerized accounting. The result was that the employees did not protect the data. They could
share their passwords, and they could use their computers for other users including downloading
personal files from unknown sources (Hanini 53-63). In Egypt, a similar study concurred with
the same, with additional threats being attacks by cybercriminals, and use of virus-infected
computers. According to the study, this leads to increased loss of data. In addition, in Egypt it
was found that the employees could enter data wrongly, which could cost the organization
greatly. Accidental loss of data after entry was also another issue. These issues are also a threat
in the United States and other parts of the world (Abu-Musa 187-203).
The first remedy can be proper training of employees to protect data. This is essential
because it assist employees take their roles behind the computer screens seriously and
professionally. It can also outline some protocols that can reduce some of the common mistakes
such as use of weak passwords, sharing of passwords, and other concerns. After training
employees, the legal team should provide with a legally binding policy that can be used against
them if they do malpractices such as shutting down antiviruses and firewalls, use of personal

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
Surname 2
social and email on corporate computers, and reckless downloading of files, among other rules
against negligence. This can reduce recklessness and unprofessionalism at work.
The first and most important step I would take in defrauding the system is gaining access
to data anonymously. I would get this access through spear phishing, an attack on the system
through the personal email that requests them for their login information to continue. After the
data is entered into the malware, it is sent back to my computer operating under a secure server. I
will then change financial data to suit my personal needs, for instance altering my payment
details, and ensuring to alter all the other payments to confuse the system by causing a
background noise. The major potential consequences of the fraudulent activities include loss of
data due to the malware introduced, loss of money due to the manipulation of data, and loss of
jobs of the employees die to failure noted in data entry if the faults are noted during internal and
external audits (Singh 1-27).

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Surname 1 Student’s Name Professor Course Date Threats to Computerized Accounting A study on the threats to computerized accounting in Jordan studies the main threat to computerized accounting. The result was that the employees did not protect the data. They could share their passwords, and they could use their computers for other users including downloading personal files from unknown sources (Hanini 53-63). In Egypt, a similar study concurred with the same, with additional threats being attacks by cybercriminals, and use of virus-infected computers. According to the study, this leads to increased loss of data. In addition, in Egypt it was found that the employees could enter data wrongly, which could cost the organization greatly. Accidental loss of data after entry was also another issue. These issues are also a threat in the United States and other parts of the world (Abu-Musa 187 ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents