Question

In: Accounting

Unit of Establish and maintain accounting information systems Identify and describe 2 data protection risks users...

Unit of Establish and maintain accounting information systems

Identify and describe 2 data protection risks users face when using cloud computing services to store confidential financial data.

(Compare and contrast methods of data protection).

Solutions

Expert Solution

DATA PROTECTION AND CLOUD COMPUTING

? What is cloud computing in accounts

Cloud computing accounting softwares are those softwares, that is hosted on remote servers. Cloud computing is the distribution/delivery of various hardware and software services over the internet through a network of remote servers. The cloud accounting softaware can be used to frees the business from having to install and maintain software on inividual desktop computers. Such system also helpful for the employees in remote areas or branch offices to access datas/ information along with the usage of same version of software.

? Data protection risks

Mainly data protection and privacy are the noted risks associated with the cloud computing accounting. Any failure in the actual protection of datas/information can cause serious issues/consequences. The risks associated with these are:

  • unauthorized disclosure or access of informations, especially the core financial performance of business.
  • malicious activities, like; hacking,jacking, viruses etc.
  • loss or damages by your service provider/employees.
  • inefficiency in the securities of data protection.
  • data breaches
  • weak authentication and identity management.

[1] DATA BREACH : Data breach is the result of a malicious and probably intrusive action. A data breach can expose sensitive customers informations, trade secrets, intellectual property, all of which can lead to serious consequences. Under this all the information/data is leaked. Under this attackers target and leak all the information from cloud storage and servers.

[2] WEAK AUTHENTICATION : A lack of authentication and identity management can lead to data loss and breaches within organizations. Poor identity management can leave gaping holes in enterprise cyber security. Business organizations are often struggle with the poor identity management as they try to allocate permissions appropriate to every user's job role.

? DATA PROTECTION METHODS IN CLOUD COMPUTING

  1. AUTHENTICATION
  2. ACCESS CONTROL
  3. SECURE DELEGATION
  4. INTEGRITY CHECKING
  5. DATA MASKING

authentication and identity : maintenance of confidentiality, integrity and available for datas are one of the most important method of data protection in cloud computing sytem of accounting. It is done through the function of correct application and configuration of familiar networks, system and application security mechanisms at various levels in the cloud infrastructure.

access control : access control should be given to the restrictive persons, there by avoid the public interference in to the crucial datas, and informations of financial datas in accounting.

secure delegation : secure delegation is the method , whereby the the computer handling over their authentication credentials to another user, to ensure protection to datas.

integrity checking : it is the process of comparing the current state of stored data/programme to a previously recorded state inorder to detect any changes.

data masking : it is a method/technique that is used /applied to make your data non-accessible for noproduction users. It is the method of creating a structurally similar versions of an organization's data used for purposes such as software testing and user training.  


Related Solutions

Identify four risks associated with IT systems in accounting. For each of the four risks, identify...
Identify four risks associated with IT systems in accounting. For each of the four risks, identify whether they are mitigated by IT general controls or IT application controls. Identify a specific control that mitigates the risk (for each of the four IT risks identified) and explain how it mitigates the risk identified.
Identify the main users of accounting information for a university.
Identify the main users of accounting information for a university.
Describe how accounting information systems have assisted businesses in developing their cost accounting systems.
Describe how accounting information systems have assisted businesses in developing their cost accounting systems.
1.   Define accounting. Who are the major users of accounting information? 2.   What are the three...
1.   Define accounting. Who are the major users of accounting information? 2.   What are the three major business activities in which accountants play a major role? Give an example of each. 3.   What does the term GAAP mean? Briefly explain the roles of the Financial Accounting Standards Board and the Securities and Exchange Commission. 4.   What is double-entry bookkeeping? Give a brief example. 5.   List the four major financial statements. Which financial statements are permanent and which are temporary?
Competency Evaluate the threats and risks associated with accounting information systems. Scenario Information BeGood Baking Supply...
Competency Evaluate the threats and risks associated with accounting information systems. Scenario Information BeGood Baking Supply is a small bakery supply company formed as a closely held corporation. The company supplies raw baking materials, paper goods, and equipment to restaurants and bakeries in three states in the upper mid-west. Most of its business, however, is located in a large metropolitan area. BeGood wants to increase its presence in the region and serve five states. In fact, the owners of BeGood...
(a) Who are internal users of accounting data? (b) How does accounting provide relevant data to these users?
(a) Who are internal users of accounting data?(b) How does accounting provide relevant data to these users?
Question 2 - 4 marks (750 words) Identify the main users of accounting referred to within...
Question 2 - 4 marks (750 words) Identify the main users of accounting referred to within the AASB/IASB conceptual framework. Does the identification of particular users within the conceptual framework have implications for the future of accounting measurement? In your response you will need to consider the implications of the identification of particular users on the use of fair values and historical cost accounting.
Explain the usefulness of the concept of “profit” to users of accounting information.
Explain the usefulness of the concept of “profit” to users of accounting information.
Differentiate between internal users and external users and explain the examples of the accounting information required.
Differentiate between internal users and external users and explain the examples of the accounting information required.
Which of the following is false about risks associated with the use of computers? Data protection...
Which of the following is false about risks associated with the use of computers? Data protection requirements are the compliance risks. The selection of new software is an opportunity risk. Virus infection is one of control risks. All of the above are true. The management strategy for a Control Risk is generally to: Mitigate it Manage it Embrace it Avoid it A risk whose impact could be positive or negative but which the organization does not take by deliberate choice...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT