assigment 5

docx

School

Iowa State University *

*We aren’t endorsed by this school

Course

317

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by l14la

Report
In the assignment 4, the 2-3 proposed solutions to cybersecurity threat in accounting are the cybersecurity program and the implementing strong IT controls. Now, that we identified the solutions, the 2-3 criteria or standards against which potential solutions will be evaluated to make decisions about which of the proposed solutions ought to be pursued as a response to the problem we are addressing are the skills required for the solution, cost efficiency and ethical standards to implement the solution. An acceptable yardstick against which to measure the desirability of one proposed solution versus another is the performance of a particular solution and how they impact the organization. In this paragraph we are evaluating and analyzing the first proposed solution which is the cybersecurity program. In this program, firms create policies for employees to follow and conduct assessments that would help the firms to identify possible attacks and impacts using existing controls. To implement this solution employees must have required skills. Having the right skills on assessment is important because the firms need to identify potential security risk and create policies against them and been able to evaluate them for their effectiveness. Based on Accounting Today its imperative to have employees trained on what to look for because most of the major breaches are from people and process failures. To remain safe from breaches or other malware-related issues, employees must be diligent at recognizing and managing phishing emails (Braton & Anderson,2020). Recognition skills is needed on the training and practices of employees to help a film to reduce the chances of a company-wide breach. We also need to consider skills like communication, teamwork, and leadership. Cybersecurity is all about effective communication because they need to communicate the risk, ideas and threats. The skills in cybersecurity program are very significant not only because helps a firm to combat the attacks but also it helps them to
interact effectively with others and navigate the many social situation that may arise in the workplace. Now that we discuss skills required in cybersecurity program. When it comes to evaluating the cybersecurity program, we also consider cost effective criteria. The reason I choose these criteria is because I want to know if the cost of using this program is accessible to small firms and mid-size firms. We also need to know if the training and practices for employees are effective to avoid cyberattacks and if helps the firm to reduce cyberattacks. The reason of why I decided to go with these criteria is because it’s important to know the before and after of training and practices of employees. The cost effective on cybersecurity program works for this solution because the cost of training can be accessible to all sizes of firms. Implementing polices are cost effective because by creating password policies to reduce the risk of cyberattacks which is very efficient. Ethical practices also play a role in cybersecurity program, because even when a firm trains their employees or create policies it’s important that they have ethical standards. In the world of cybersecurity, the ethical practices are essential for protecting data and maintaining trust. In this solution is very important that the employees have ethical practices because these is where we can separate cybersecurity professionals from hackers. When we evaluate this solution, we need to be aware if the employee have ethical practices when they create policies and follow them, conducting assessment to detect cyberattacks and finally to make sure they practice what they learn in their training. In this paragraph we will discuss the second solution and the criteria. A good solution should have skills, cost effective and ethical criteria. The skills needed for these solutions are technological skills and communications skills. For, cost effective, the IT
controls should be cost effective by letting all size firms have access to different IT control like perimeter and endpoint security. For multi-factor authentication process, firms should be able to provide their employees two or more factors to gain data access (Ackerman,2017). For this solution is very important that the firms have access to the different IT controls that we discuss in last assignment. This control helps to reduce and prevent the cyberthreat. If a firm is not able to access to these criteria, it can affect their company’s performance. The ethical practices somehow are the most important in IT controls. Cybersecurity in accounting might be legal but not ethical. Unethical or ethical dubious cybersecurity practices can result in significant harm and reputation damage of network users, clients, companies, and cybersecurity professionals themselves. In this solution, they must lead with sensitive information and have access to different types of logins form a firm, its important for a firm to have a trust person in their company. Evaluating and analyzing each of the proposed solutions in a view of the criteria I conclude that IT controls is the best solution to the cybersecurity in accounting issue. The reason is because cost-effective of training employees is not very effective. The firms need to update and offer their training very often due to advancements in technology which increases the risk of cyberattack. The cost and performance issues can be justified by hiring engineers which can provide training.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Ackerman, J. L. (2017). How to protect a CPA Firm in the digital age. CPA Journal , 87 (3), 72–73. https://libproxy.bvu.edu/login?url=https://search.ebscohost.com/login.aspx? direct=true&AuthType=ip,cookie&db=bsh&AN=121733201&site=ehost-live&scope= site Hood, D. (2019). Firm leaders look to technology to drive future change: Accounting Today , 33 (4), N.PAG. https://libproxy.bvu.edu/login?url=https://search.ebscohost.com/login.aspx? direct=true&AuthType=ip,cookie&db=buh&AN=135689111&site=ehost-live&scope=site Barton, D., & Anderson, K. (2020). Reeling in a big phish: Strong cybersecurity and employee training are crucial. Accounting Today , 34 (3), N.PAG. https://libproxy.bvu.edu/login?url=https://search.ebscohost.com/login.aspx? direct=true&AuthType=ip,cookie&db=bsh&AN=142025591&login.asp&site=ehost- live&scope=site