Consider the risk to "integrity of customer and financial data files on system" from "corruption of these files due to import of a worm/virus onto a system". From the list shown in Table 15.3 in your...

1 answer below »

Consider the risk to "integrity of customer and financial data files on system" from "corruption of these files due to import of a worm/virus onto a system". From the list shown in Table 15.3 in your textbook, select some suitable specific controls that could reduce this risk. Indicate which you believe would be the most cost effective. Support your answers with references.


Your well-written paper should meet the following requirements:



  • Paper length: 2-3 pages

  • Include an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.

  • Include two external, scholarly references in addition to the textbook. Do not use blogs, wikis, or other non-scholarly sources.

The attached screenshot is the list from Table 15.3
Answered Same DayJul 13, 2021

Answer To: Consider the risk to "integrity of customer and financial data files on system" from "corruption of...

Somudranil answered on Jul 15 2021
156 Votes
Running Head: Controls for security breach        1
Controls for security breach        3
CONTROLS FOR SECURITY BREACH
Table of Contents
Discussion    3
References    4
Discussion

    The small accounting firms appears to have limitations in regards to the support concerning the information technology. It is therefore considered to be a dire situation for the systems of the small firms. It is so because they have certain anti-virus software installed into their system that are outdated. It is only due to this factor and the state of being outdated that the worm or maybe the virus will tend to sabotage the workings of the system. The accounting firm are relatively smaller ones and do not have any kind of back up services (Suuronen & Bergenwall, 2016). Therefore, the infection can have a negative impact on a lot of confidential data stored into the system. Once there is a loss of the data then the operational functions of the organizations are likely to get affected. The confidentiality of the information is essential to the survival of the company and once it gets leaked or destroyed then the company or the organization will stand at the threshold of getting exterminated. However, there can be effective security controls that can be mandated for minimizing the threat and therefore they are listed as follows:
1. It is important to create an awareness pertaining to the security and this can only be ascertained by adherence to an appropriate training process.
2. The employees are to be provided control so that they can access them without any difficulties for discarding any and every kind of threats that might exist in the system. The potentiality of the virus...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here