Question

In: Accounting

If the analyst does not have the security permissions to access the data directly, then a...

If the analyst does not have the security permissions to access the data directly, then a data request form is required. There are a number of fields that the analyst is required to complete. What fields are necessary in a data request form? Who needs to be included in the routing of this form? Explain the form and the approval process you would recommend.

Adapted from Richardson, V. J., Teeter, R., & Terrell, K. (n.d.). Data analytics for accounting. Problems [TA1] [VP2]

Solutions

Expert Solution

Here is a sample copy of the form

The sample fields are in the form above.

Also in addition to these fields, there must be specified and restrictive additional CONDITIONS that must be specified.

It should be approved by the immediate contact of the analyst and the Head of the department that has hired the analyst. Also, it must be reviewed by the Head of IT department.


Related Solutions

You have been hired as a security and data analyst for a company operating an online...
You have been hired as a security and data analyst for a company operating an online social media platforman. You are tasked to work on a project to identify possible threats related to fake user accounts (so called sibyls ). How can you get started on the project? Try to break it down using the the six phases of the CRISP-DM process. Start your analysis by explaining briefly what the goal of each phase of CRISP-DM is. Use bullet structured...
Mobile App security – Explore app permissions, how are they being used, where data being transmitted....
Mobile App security – Explore app permissions, how are they being used, where data being transmitted. Hi, thesis my topic for the project.Iam in need of help in figuring out how to start my research and also have some questions regarding the topic 1. name 10 apps for which I can use to explore its app permissions and data gathering?. 2.Are there any software or app that can be installed to collect the information regarding the app permissions? 3.I need...
1. Which Linux permissions would assign the owner full access, the group RX access, and everyone...
1. Which Linux permissions would assign the owner full access, the group RX access, and everyone else read access. 2. An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel iframe that directs all website visitors to a webpage of his choosing that then installs malware on the visitors' computers. The attacker did this explicitly because he knows that US policymakers frequent the website. This would be an example of...
Having security policies and procedures that document and manage access to critical data and technology is...
Having security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another. Describe and evaluate how authentication controls can enforce security policies within an organization.
A security analyst is reviewing an endpoint mat was found to have a rootkit installed. The...
A security analyst is reviewing an endpoint mat was found to have a rootkit installed. The root kit survived multiple attempts to clean the endpoint as well as an attempt to reinstall the OS. The security analyst needs to implement a method to prevent other endpoints from having similar issues. Which of the following would BEST accomplish this objective? Utilize measured boot attestation Enforce the secure boot process Reset the motherboard's TPM chip Reinstall the OS with Known-good media Configure...
Having security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another.
Authentication, Authorization, AccountingHaving security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another. Describe and evaluate how authentication controls can enforce security policies within an organization.
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to...
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to certain network and system resources. 2. T/F. When establishing firewall rules, the most prudent configuration is to implicitly deny by blocking all traffic by default then rely on business need and justification to create new rules as exceptions. 3. T/F. By default, all virtual private network (VPN) client software encrypts network traffic. 4. T/F. Asymmetric encryption is more secure than symmetric encryption.
An important player in the Analytics process is the Data Analyst. But what exactly does a...
An important player in the Analytics process is the Data Analyst. But what exactly does a Data Analyst do? To find out go online and review the major job boards. Find at least three job postings for a Data Analyst on three different job boards. What is a Data Analyst? What are the qualifications needed to be a Data Analyst? What is the commonality in the job postings? Based on your observations, would you be interested in a job as...
What does it mean to have layered security protection?
What does it mean to have layered security protection?
What does the SDLC have to do with Computer Security?
What does the SDLC have to do with Computer Security?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT