ACC 427 6-3 Short Paper- Data Research
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
427
Subject
Accounting
Date
Nov 24, 2024
Type
docx
Pages
8
Uploaded by Barbara8289
1
6-3 Short Paper: Data Research
Harriet Creyer
6-3 Short Paper: Data Research
Southern New Hampshire University
ACC 427 – Investigating with Computers
2
6-3 Short Paper: Data Research
Examine the Practical Suspicious Email.txt File
A Data analyst tool is a phrase used to describe software and the applications that analysts use in order to “develop and perform analytical processes that help companies to make better, informed business decisions while decreasing costs and increasing profits.” (
Essential Data Analyst Tools discover a list of the 17 best data analysis software & tools on the market
)
During your monitoring operations, you find an employee that appears to be emailing a large book, and you decide to give this file further inspection. However, the book appears to be over 48,000 lines of text, and you cannot read each line.
For inspecting a large text file containing over 48,000 lines, I would choose an Ultra Edit for the Suspicious Email. It is currently being advertised as “the most flexible, powerful, and secure text editor.” (
UltraEdit text + code editing software
2023). It is also available across multiple platforms inc. Mac and Windows. Regular Expression Search: Find email addresses in the file. Search Query: grep -E -o
"..+@[A-Za-z0-9.-]+\.[A-Za-z]{2,}\b" (
Grep
) file.txt Description: This command uses a regular expression to search for email addresses in the file.txt. The -E option enables extended regular expressions, and the -o option displays only the matching portion of the line.
I also tried \b[A-Z0-9._%+-]
+@[A-Z0-9.-]+\.[A-Z]{2,}\b
(
Grep
)
. Both showing no results found.
3
6-3 Short Paper: Data Research
Regular Expression Search: Look for Social Security numbers in the file. Search Query: grep -E -o "\b(\+\d{1,3})?[-.\s]?\(?\d{3}\)?[-.\s]?\d{3}[-.\s]?\d{4}\b" (
Grep
)
file.txt Description: This command uses a regular expression to search for phone numbers in various formats in the file.txt. It can handle phone numbers with or without country codes, with or without parentheses, and with different separators. I also tried \b[A-Z0-9._%+-]
+@[A-Z0-
9.-]+\.[A-Z]{2,}\b
; again, showings no results. I tried to search for specific number for example 0-9 and the only results that were populated were the dates and the chapter numbers throughout the text.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
6-3 Short Paper: Data Research
Examine the Practical Suspicious Email Bonus.csv File
Once again, you are the investigator at the same U.S.-based bank. Your findings from the first monitoring effort have you very concerned, and you have decided to open a case on your subject employee. The next file you have under review is very different from the first, as it contains what appears to be a series of random numbers. Note that the file seems to be very large.
To investigate the second file containing random numbers, I would use Code Runner. I chose to use Code Runner as it was compatible with MAC and was a very easy to use tool. It is able to do an entire desktop search for the codes and information you request an input. I would perform regular expression searches to identify patterns, sensitive information, or anomalies within the data. (
CodeRunner 4
)
I would conduct my first search to identify anything that may resemble a social security number (SSN). I found there were 49,138 matches that could potentially be social security numbers The expression I used was \d{9} and \d{3}-\d{2}-\d{4} (
Grep
) just in case
this employee tried to ‘hide’ regularly formatted SSNs amongst the vast amount of information; I searched for 9 digits as a ‘standalone’ figure just incase there were any SSNs without any ‘-‘
. Because these numbers could potentially be social security numbers, it raises a red flag and there should be further investigation to compare these numbers with the company’s payroll department to determine if the sender of this document is stealing personally identifiable information from his employer that can be sold on the dark web. (Goyvaerts)
My concern would be that whoever obtained the information could potentially know who any SSN’s were hidden within these figures for example adding a 0/1 at the start of an
5
6-3 Short Paper: Data Research
SSN and/or an 8/9 at the end. This would create more numbers than what would be searched for but also ‘hide’ the SSN.
Another Regular expression that I did was to search for credit card numbers using regular expressions (e.g., \d{4}-\d{4}-\d{4}-\d{4}) and \b\d{13,16}\b (
Grep
)
; this would allow for a search for any numbers that are laid out in the format of a credit card number with
a 4-4-4-4 but also any specific numbers that are between 13-16 digits, for example an American express card has less digits than a standard credit card. Both of these regular expressions found no results within this information. (Goyvaerts)
However, a search for bank account numbers or routing numbers using regular expressions could potentially run into the same problems found when searching for SSN’s. It could potentially be ‘hidden’ within numbers and only the person who formatted this information would know.
6
6-3 Short Paper: Data Research
Summary
The information within the first email didn’t turn up any significant numerical information, however, that is not to say that the recipient of this email and the sender have some sort of code to break down the information. After reviewing this data, it has raised some
rather large red flags concerning how this information has been stored. The employee emailing just this information is extremely concerning and is clearly hiding something within
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
6-3 Short Paper: Data Research
the information to which they and the recipient may be the only ones to be able to read this information. I think it is difficult to fully interpret this information without having the ‘code’ if there is one. Within the large data files data can be easily manipulated as mentioned and it could possibly only be ‘translated’ by the sender.
8
6-3 Short Paper: Data Research
References
CodeRunner 4
. CodeRunner. (n.d.). https://coderunnerapp.com/
Command line compare of files and folders with DOS command prompt
. UltraEdit. (2022, December 20). https://www.ultraedit.com/support/tutorials-power-tips/ultracompare/
command-line/
Essential Data Analyst Tools discover a list of the 17 best data analysis software & tools on the market
. Top 17 Data Analytics Tools - Best Software for Data Analysts. (n.d.). https://www.datapine.com/articles/data-analyst-tools-software
Goyvaerts, J. (n.d.-a). Finding or verifying credit card numbers. https://www.regular-
expressions.info/creditcard.html
Goyvaerts, J. (n.d.-b).
Specialized tools and utilities for working with regular expressions
. Popular Tools, Utilities and Programming Languages That Support Regular Expressions. https://www.regular-expressions.info/tools.html
Grep . GNU Grep 3.11. (n.d.). https://www.gnu.org/software/grep/manual/grep.html#Command_002dline-Options
GREP(1) - linux manual page. (n.d.). https://man7.org/linux/man-pages/man1/grep.1.html
UltraEdit text + code editing software
. UltraEdit. (2023, April 25). https://www.ultraedit.com/products/ultraedit/
Related Documents
Related Questions
Question #66: Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation:
Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection?
Will different system access levels for different users be incorporated?
Will customer orders be received via the Internet?
Has the company identified an off‐site alternative computer processing location?
Does the project budget include line items for an upgraded, uninterrupted power source and firewall?
Required: In a two (2) page response, describe the control purpose for each point presented in the case.
arrow_forward
Big Data
Big data and data analytics are becoming an important part of an accountant's methods for analyzing the different companies and their performances. The use of these elements enhances organizational performance, improves fraud detection, and increases audit performance and scope.
Use the Internet or Strayer University Library databases to review at least two news articles or publications about current and future trends in the use of big data.
Choose a company that is not publicly traded (a small or medium-sized company).
Review the company, and suggest some of the ways in which big data would benefit this company.
arrow_forward
Please answer multichoice question in photo
arrow_forward
Understanding components of a computerized accounting information system
Ned Timmons, engineer, is considering using a computerized accounting system for his professional engineering business. Ned has asked that you help him understand the components of a computerized accounting information system by answering the following questions:
Requirements
1. What are the two basic components of a computerized accounting information system?
2. Provide examples of each component.
3. If Ned were interested in an entry-level software system, what software might you recommend?
arrow_forward
Industry Tools Research
Your manager has asked you to recommend an industry tool for purchase. Select one of the following tools to research: ACL, IDEA, Microsoft Visio, Oversight, Power BI, Alteryx, and Tableau.
Identify key features of each tool.
Discuss how auditors can incorporate the tool into their audits.
Additional learning opportunities: If you are interested in learning more about data analytics and emerging technologies in accounting, join the Institute of Management Accountants (IMA) for only $25 per year: Students | IMA - The association of accountants and financial professionals working in business.Links to an external site. (Use code Student22). Gain access to Free courses, training, and webinars.
arrow_forward
Sh6
Please help me.
Thankyou.
arrow_forward
If you are an accounting analytics professional, what software would be considered specified and
complex?
a) Xero
b) Fresh Books
c) Intuit Quickbooks
d) Oracle NetSuite
arrow_forward
3
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337272124/9781337272124_smallCoverImage.gif)
Financial Accounting
Accounting
ISBN:9781337272124
Author:Carl Warren, James M. Reeve, Jonathan Duchac
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781133935940/9781133935940_smallCoverImage.gif)
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College
Related Questions
- Question #66: Lamar LLC is in the process of updating its revenues and receivables systems with the implementation of new accounting software. James Loden, Inc. is an independent information technology consultant who is assisting Tamar with the project. James has developed the following checklist containing internal control points that the company should consider in this new implementation: Will all data entry clerks and accounting personnel have their own PCs with log‐in IDs and password protection? Will different system access levels for different users be incorporated? Will customer orders be received via the Internet? Has the company identified an off‐site alternative computer processing location? Does the project budget include line items for an upgraded, uninterrupted power source and firewall? Required: In a two (2) page response, describe the control purpose for each point presented in the case.arrow_forwardBig Data Big data and data analytics are becoming an important part of an accountant's methods for analyzing the different companies and their performances. The use of these elements enhances organizational performance, improves fraud detection, and increases audit performance and scope. Use the Internet or Strayer University Library databases to review at least two news articles or publications about current and future trends in the use of big data. Choose a company that is not publicly traded (a small or medium-sized company). Review the company, and suggest some of the ways in which big data would benefit this company.arrow_forwardPlease answer multichoice question in photoarrow_forward
- Understanding components of a computerized accounting information system Ned Timmons, engineer, is considering using a computerized accounting system for his professional engineering business. Ned has asked that you help him understand the components of a computerized accounting information system by answering the following questions: Requirements 1. What are the two basic components of a computerized accounting information system? 2. Provide examples of each component. 3. If Ned were interested in an entry-level software system, what software might you recommend?arrow_forwardIndustry Tools Research Your manager has asked you to recommend an industry tool for purchase. Select one of the following tools to research: ACL, IDEA, Microsoft Visio, Oversight, Power BI, Alteryx, and Tableau. Identify key features of each tool. Discuss how auditors can incorporate the tool into their audits. Additional learning opportunities: If you are interested in learning more about data analytics and emerging technologies in accounting, join the Institute of Management Accountants (IMA) for only $25 per year: Students | IMA - The association of accountants and financial professionals working in business.Links to an external site. (Use code Student22). Gain access to Free courses, training, and webinars.arrow_forwardSh6 Please help me. Thankyou.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Financial AccountingAccountingISBN:9781337272124Author:Carl Warren, James M. Reeve, Jonathan DuchacPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax College
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337272124/9781337272124_smallCoverImage.gif)
Financial Accounting
Accounting
ISBN:9781337272124
Author:Carl Warren, James M. Reeve, Jonathan Duchac
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781133935940/9781133935940_smallCoverImage.gif)
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Principles of Accounting Volume 1
Accounting
ISBN:9781947172685
Author:OpenStax
Publisher:OpenStax College