Homework
The Cloud Effect
Please respond to the following:
--Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire of being a dominant player in the global market.
--As the CFO, describe your top-three fears in competing in the global market, and how you plan to overcome those fears. Provide support for your rationale. [250 words -- 1-2 references]
Securing Data
Please respond to the following:
--In this global age of information, suggest which threats are posed to the principles of confidentiality and privacy, related to offshore outsourcing of various information systems functions. Provide support for your rationale.
--Determine who should be held liable for any breaches that occur, and indicate the course(s) of action that should be taken. [250 words -- 1-2 references]
Assignment
Hacking the AIS
In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.
For this assignment, research the Internet or Strayer databases for information related to business systems that have been hacked.
Write a six to seven (6-7) page paper in which you:
1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
4. Provide at least three (4) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
5. Use at least three (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
The specific course learning outcomes associated with this assignment are:
· Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
· Use technology and information resources to research issues in accounting information systems.
· Write clearly and concisely about accounting information systems using proper writing mechanics.

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com