
Accounting Information Systems 7th Edition by Cynthia Heagy,Constance Lehmann
Edition 7ISBN: 978-1111219512
Accounting Information Systems 7th Edition by Cynthia Heagy,Constance Lehmann
Edition 7ISBN: 978-1111219512 Exercise 10
Aidbart Company has recently installed a new client-server accounting system. Workstations are located throughout the company. James Lanta, controller, has overall responsibility' for the company's accounting information system, but he relies heavily on Sue West, manager of information
services, for technical assistance and direction.
Lanta was one of the primary supporters of the new system because he knew it would provide labor savings. However, he is concerned about the security of the new system. Lanta was walking through the purchasing department recently when he observed an Aidbart buyer using a workstation to inquire about the current price for a specific part used by Aidbart. The new system enabled the buyer to view data regarding the part on the screen. In addition to the price of the part, the screen also showed each Aidbart product that used the part and the total manufacturing cost of the products using the part The buyer told Lanta that, in addition to inquiring about the part, he could also change the costs of parts. Lanta scheduled a meeting with West to review his concerns regarding the new system. Lanta stated, "Sue, I'm concerned about the type and amount of data that can be accessed through the workstations. How can we protect ourselves against unauthorized access to our files? Also, what happens if we have a natural disaster such as a fire, a passive threat such as a power outage, or some active threat resulting in malicious damage? Could we continue to operate? We need to show management that we are on top of these things. Would you please outline the procedures we now have or need to have to protect ourselves?"
West responded by saying, "Jim, there are areas of vulnerability in any accounting information system. The four major points of vulnerability with which we should be concerned are the hardware, the software, the people, and the network."
Required:
For each of the four major points of vulnerability identified by Sue West, list at least one risk exposure to the system and give your assessment of the degree (low, moderate, high) of possible risk exposure.
[CMA adapted]
services, for technical assistance and direction.
Lanta was one of the primary supporters of the new system because he knew it would provide labor savings. However, he is concerned about the security of the new system. Lanta was walking through the purchasing department recently when he observed an Aidbart buyer using a workstation to inquire about the current price for a specific part used by Aidbart. The new system enabled the buyer to view data regarding the part on the screen. In addition to the price of the part, the screen also showed each Aidbart product that used the part and the total manufacturing cost of the products using the part The buyer told Lanta that, in addition to inquiring about the part, he could also change the costs of parts. Lanta scheduled a meeting with West to review his concerns regarding the new system. Lanta stated, "Sue, I'm concerned about the type and amount of data that can be accessed through the workstations. How can we protect ourselves against unauthorized access to our files? Also, what happens if we have a natural disaster such as a fire, a passive threat such as a power outage, or some active threat resulting in malicious damage? Could we continue to operate? We need to show management that we are on top of these things. Would you please outline the procedures we now have or need to have to protect ourselves?"
West responded by saying, "Jim, there are areas of vulnerability in any accounting information system. The four major points of vulnerability with which we should be concerned are the hardware, the software, the people, and the network."
Required:
For each of the four major points of vulnerability identified by Sue West, list at least one risk exposure to the system and give your assessment of the degree (low, moderate, high) of possible risk exposure.
[CMA adapted]
Explanation
Four points of vulnerability that were i...
Accounting Information Systems 7th Edition by Cynthia Heagy,Constance Lehmann
Why don’t you like this exercise?
Other Minimum 8 character and maximum 255 character
Character 255