Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In this activity, your instructor will assign you to a group with four or five of your peers. Each group member will select a different

In this activity, your instructor will assign you to a group with four or five of your peers. Each group member will select a different computer fraud event from the following list. Research the topic and discuss how the fraud occurred. Assess the effectiveness of the companys internal controls and recommend accounting information system (AIS) controls that will mitigate the risk of future attacks. Ensure your recommendation is in compliance with industry standards. Russian hackers broke into Citibanks system and stole $10 million from customer accounts. Acxiom manages customer information for credit card issuers, banks, automotive manufacturers, and retailers. A systems administrator for a company doing business with Acxiom exceeded his authorized access, downloaded an encrypted password file, and used a password-cracking program to access confidential IDs. The intrusion cost Acxiom over $5.8 million. During the Iraq war, Dutch hackers stole confidential information, including troop movements and weapons information, at 34 military sites. Their offer to sell the information to Iraq was declined, probably because Iraq feared it was a setup. A 17-year-old hacker broke into the Bell Laboratories network, destroyed files, copied 52 proprietary software programs, and published confidential information on underground bulletin boards. Many hackers are young, some as young as 12. In the worst security breach in gaming history, 101 million Sony PlayStation accounts were hacked, crashing the network for over a month. More than 12 million credit card numbers, email addresses, passwords, home addresses, and other data were stolen.

Once each group member has submitted their assessment and recommendation, discuss the similarities and differences between the internal controls that allowed this fraud to occur and between the AIS controls recommended to prevent future occurrences. Do you agree with your peers recommendations? Explain why or why not and support your claim with relevant research.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Operational Auditing Handbook Auditing Business And IT Processes

Authors: Andrew Chambers, Graham Rand

2nd Edition

0470744766, 978-0470744765

More Books

Students also viewed these Accounting questions

Question

1. Briefly describe the five components of emotions.

Answered: 1 week ago

Question

here) and other areas you consider relevant.

Answered: 1 week ago