Question

In: Accounting

If the analyst does not have the security permissions to access the data directly, then a...

If the analyst does not have the security permissions to access the data directly, then a data request form is required. There are a number of fields that the analyst is required to complete. What fields are necessary in a data request form? Who needs to be included in the routing of this form? Explain the form and the approval process you would recommend.

Adapted from Richardson, V. J., Teeter, R., & Terrell, K. (n.d.). Data analytics for accounting. Problems [TA1] [VP2]

Solutions

Expert Solution

Here is a sample copy of the form

The sample fields are in the form above.

Also in addition to these fields, there must be specified and restrictive additional CONDITIONS that must be specified.

It should be approved by the immediate contact of the analyst and the Head of the department that has hired the analyst. Also, it must be reviewed by the Head of IT department.


Related Solutions

You have been hired as a security and data analyst for a company operating an online...
You have been hired as a security and data analyst for a company operating an online social media platforman. You are tasked to work on a project to identify possible threats related to fake user accounts (so called sibyls ). How can you get started on the project? Try to break it down using the the six phases of the CRISP-DM process. Start your analysis by explaining briefly what the goal of each phase of CRISP-DM is. Use bullet structured...
1. Which Linux permissions would assign the owner full access, the group RX access, and everyone...
1. Which Linux permissions would assign the owner full access, the group RX access, and everyone else read access. 2. An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel iframe that directs all website visitors to a webpage of his choosing that then installs malware on the visitors' computers. The attacker did this explicitly because he knows that US policymakers frequent the website. This would be an example of...
Having security policies and procedures that document and manage access to critical data and technology is...
Having security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another. Describe and evaluate how authentication controls can enforce security policies within an organization.
Having security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another.
Authentication, Authorization, AccountingHaving security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another. Describe and evaluate how authentication controls can enforce security policies within an organization.
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to...
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to certain network and system resources. 2. T/F. When establishing firewall rules, the most prudent configuration is to implicitly deny by blocking all traffic by default then rely on business need and justification to create new rules as exceptions. 3. T/F. By default, all virtual private network (VPN) client software encrypts network traffic. 4. T/F. Asymmetric encryption is more secure than symmetric encryption.
An important player in the Analytics process is the Data Analyst. But what exactly does a...
An important player in the Analytics process is the Data Analyst. But what exactly does a Data Analyst do? To find out go online and review the major job boards. Find at least three job postings for a Data Analyst on three different job boards. What is a Data Analyst? What are the qualifications needed to be a Data Analyst? What is the commonality in the job postings? Based on your observations, would you be interested in a job as...
What does it mean to have layered security protection?
What does it mean to have layered security protection?
You have joined a company as a network security analyst. Your CTO came to know you...
You have joined a company as a network security analyst. Your CTO came to know you are a graduate from MIT Melbourne/Sydney and successfully completed a VPN unit. Therefore, you have been asked to develop a security plan for your customers and remote managers for their Internet access to the business. You need to analyse the following cases and recommend the solutions for the question quen-1) You want to assist customers in building trust with your company. Discuss with your...
What is Document Life cycle Security? How does this integrate into EDMS? How does the data...
What is Document Life cycle Security? How does this integrate into EDMS? How does the data elements fit into the overall document life cycle. What are metadata and document storage requirements and recommended document life cycle.
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words,...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words, answer the following question. Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations. For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT