assigment 5
docx
keyboard_arrow_up
School
Iowa State University *
*We aren’t endorsed by this school
Course
317
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by l14la
In the assignment 4, the 2-3 proposed solutions to cybersecurity threat in accounting
are the cybersecurity program and the implementing strong IT controls. Now, that we
identified the solutions, the 2-3 criteria or standards against which potential solutions will
be evaluated to make decisions about which of the proposed solutions ought to be pursued
as a response to the problem we are addressing are the skills required for the solution, cost
efficiency and ethical standards to implement the solution. An acceptable yardstick against
which to measure the desirability of one proposed solution versus another is the
performance of a particular solution and how they impact the organization.
In this paragraph we are evaluating and analyzing the first proposed solution which
is the cybersecurity program. In this program, firms create policies for employees to follow
and conduct assessments that would help the firms to identify possible attacks and impacts
using existing controls. To implement this solution employees must have required skills.
Having the right skills on assessment is important because the firms need to identify
potential security risk and create policies against them and been able to evaluate them for
their effectiveness. Based on Accounting Today its imperative to have employees trained on
what to look for because most of the major breaches are from people and process failures.
To remain safe from breaches or other malware-related issues, employees must be diligent
at recognizing and managing phishing emails (Braton & Anderson,2020). Recognition
skills is needed on the training and practices of employees to help a film to reduce the
chances of a company-wide breach. We also need to consider skills like communication,
teamwork, and leadership. Cybersecurity is all about effective communication because they
need to communicate the risk, ideas and threats. The skills in cybersecurity program are
very significant not only because helps a firm to combat the attacks but also it helps them to
interact effectively with others and navigate the many social situation that may arise in the
workplace.
Now that we discuss skills required in cybersecurity program. When it comes to
evaluating the cybersecurity program, we also consider cost effective criteria. The reason I
choose these criteria is because I want to know if the cost of using this program is
accessible to small firms and mid-size firms. We also need to know if the training and
practices for employees are effective to avoid cyberattacks and if helps the firm to reduce
cyberattacks. The reason of why I decided to go with these criteria is because it’s important
to know the before and after of training and practices of employees. The cost effective on
cybersecurity program works for this solution because the cost of training can be accessible
to all sizes of firms. Implementing polices are cost effective because by creating password
policies to reduce the risk of cyberattacks which is very efficient.
Ethical practices also play a role in cybersecurity program, because even when a firm trains
their employees or create policies it’s important that they have ethical standards. In the
world of cybersecurity, the ethical practices are essential for protecting data and
maintaining trust. In this solution is very important that the employees have ethical
practices because these is where we can separate cybersecurity professionals from hackers.
When we evaluate this solution, we need to be aware if the employee have ethical practices
when they create policies and follow them, conducting assessment to detect cyberattacks
and finally to make sure they practice what they learn in their training.
In this paragraph we will discuss the second solution and the criteria. A good
solution should have skills, cost effective and ethical criteria. The skills needed for these
solutions are technological skills and communications skills. For, cost effective, the IT
controls should be cost effective by letting all size firms have access to different IT control
like perimeter and endpoint security. For multi-factor authentication process, firms should
be able to provide their employees two or more factors to gain data access
(Ackerman,2017). For this solution is very important that the firms have access to the
different IT controls that we discuss in last assignment. This control helps to reduce and
prevent the cyberthreat. If a firm is not able to access to these criteria, it can affect their
company’s performance. The ethical practices somehow are the most important in IT
controls. Cybersecurity in accounting might be legal but not ethical. Unethical or ethical
dubious cybersecurity practices can result in significant harm and reputation damage of
network users, clients, companies, and cybersecurity professionals themselves. In this
solution, they must lead with sensitive information and have access to different types of
logins form a firm, its important for a firm to have a trust person in their company.
Evaluating and analyzing each of the proposed solutions in a view of the criteria I
conclude that IT controls is the best solution to the cybersecurity in accounting issue. The
reason is because cost-effective of training employees is not very effective. The firms need
to update and offer their training very often due to advancements in technology which
increases the risk of cyberattack. The cost and performance issues can be justified by hiring
engineers which can provide training.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Ackerman, J. L. (2017). How to protect a CPA Firm in the digital age.
CPA Journal
,
87
(3),
72–73.
https://libproxy.bvu.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&AuthType=ip,cookie&db=bsh&AN=121733201&site=ehost-live&scope=
site
Hood, D. (2019). Firm leaders look to technology to drive future change:
Accounting Today
,
33
(4),
N.PAG.
https://libproxy.bvu.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&AuthType=ip,cookie&db=buh&AN=135689111&site=ehost-live&scope=site
Barton, D., & Anderson, K. (2020). Reeling in a big phish: Strong cybersecurity and employee
training are crucial.
Accounting Today
,
34
(3), N.PAG.
https://libproxy.bvu.edu/login?url=https://search.ebscohost.com/login.aspx?
direct=true&AuthType=ip,cookie&db=bsh&AN=142025591&login.asp&site=ehost-
live&scope=site