In this journal, Drew discuss the goals of IT security to protect the use of mobile devices in CPA firms and other businesses. His article outlines cybersecurity threats on the mobile and cloud fronts and lists steps that accounting firms, individuals CPAs, and other can take to reduce their risk of suffering a devastating data breach. Drew discusses how the rate of smartphones and tablets sales increase and how it reached 144.4 million units in the first quarter. With the growth of smartphones and tablet increasing, the risk of malicious software have increased. “One of the biggest risks involves employees or executives downloading personally identifying or confidential client information to their personal smartphones or tablets”.
The Patriot act defines specific obligations for all financial institutions to report inconsistent cash activities. Online banking has led to a deeper concern regarding the securitization of transactions. Some may say that this act is an intrusion into personal liberties; however, technology and the unethical use of such, has changed the landscape. Background checks and formal validation procedures are now part of the financial culture to ensure personal protections. Fair Credit Reporting Act of 1970 The Fair Credit Reporting Act (FCRA) was enacted to “protect consumers from the disclosure of inaccurate and arbitrary personal information held by consumer reporting agencies” (Consumer Privacy, 2001, ¶1).
This will make it much harder for the hacker to access the information easily. This is why you should see HTTPS whenever you are dealing with an online transaction. The S in HTTPS stands for secure which is a 256 byte encryption of the transmission. Additional system security requirements are secure user authentication, secure access control, reasonable monitoring to detect unauthorized access, reasonably up-to-date firewall protection, reasonably up-to-date security software (including current patches and virus definitions), and education and training of employees. By following these protocols, the banking industry has the ability and means to protect the customers’ information and
Other types of risks that BUGusa, Inc. can potentially face without property protection and poor management are: loss in customer trust, penalties for law violations, compliance risk, availability risk, access risk, and more. (Priviti, 2008) B. Discuss in detail what types(s), if any, of civil liability Steve and/or WIRETIME may face if caught. a. BUGusa is facing the issues of their work being stolen and internet hacking. Not to mention WIRETIME is unethical in their actions.
People who have committed crimes and who have been caught have had their personal information entered into a computer system. These systems are being connected thought the world making it easier for law enforcement to track people’s movement. As long as an agency is connected to the system, they can receive information, such as DNA, fingerprints, pictures, and videos. This type of technology has made solving crimes quicker; however, this technology has also benefited criminal, who can know use the internet to commit crimes against others. This also caused crime rates to increase.
Because transactions take place over the internet companies have to ensure that the customer’s personal information is safe along with the company’s information. Companies use different types of security programs to keep information safe from computer attacks. Computer attacks on a company can happen when the security program is not effective enough to keep these attacks from happening or from the lack of monitoring of the security program from management. The task of monitoring the security program is given to management, so companies should be held liable for losses sustained in a successful attack made on its AIS by outside sources. In the following an explanation of management’s role and why a company should be held liable.
I can assume that my organization MIS department will do it for me because they would identify issues and problems and promote to employees how to protect their assets that might be vulnerable to theft in the outside world. It’s important to protecting our assets that might be on portable devices to prevent the theft, use two factor authentications, and encrypt your data. Protecting your privacy by using strong passwords, adjusting the privacy settings on your computer, and surf the web anonymously. Other ways to protecting your privacy may include e-mail anonymously by reporting spam to your email provider and knowing what information on your emal is creditable, and by erasing your Google search history to prevent important history from being discovered. | 2.
The company has been affected in a good way because this act allows the company to have the right to sell their products and services. Which allows the business to keep running and trading. * Consumer protection from unfair trading. This law is in place to prevent traders are honest and fair when offering their products and services for sale. Examples of how business have been affected by consumer protection from unfair trading- 1.
What is one new trend in organized crime? Why? The use of cybercrime, mainly because it is simple, fast and reaps huge payoffs. They use computers and the internet for all kinds of organized crime not just identity theft or hacking into banks but some are as simple as using the internet to sell medications at much cheaper prices but lowering the dose so that they are not
Criminals are turning to cyber-crime because of the speed and convenience. Cyber-crimes include attacks against computer data and systems, identity theft, Internet fraud, e-mail scams, and phishing. In addition the threat of terrorism forces authorities to address security vulnerabilities related to information technology infrastructure such as power plants, electric grids, information systems, and the computer systems of government and major companies. References Cantor, M. (2013). Pentagon on cyber security force: Quintuple it.