Question

In: Accounting

“Accounting Systems and Accruals" Please respond to the following: For this week's Discussion, research the most...

“Accounting Systems and Accruals"

Please respond to the following:

For this week's Discussion, research the most common threats to a computerized accounting system using the Internet and/or Strayer databases. Be prepared to discuss.

Upon examination of the greatest threats to a computerized accounting system, suggest two (2) preventive measures or remedies that protect the system and/or mitigate any negative impacts to the system. Provide a rationale for your response.

Your boss is concerned that the company’s computerized accounting system is vulnerable to attack. After reviewing the system, you’re in agreement. Write a brief report (approximately one [1] paragraph in length) of how someone might hack into your systems and commit fraud with the accruals. What major damages to the company’s financial statements could result from such a fraud?”

Solutions

Expert Solution

The most common threats to a computerized accounting system are security breaches andunethical employees. Accounting systems contain confidential information that should be kept safe and secure at all times. When accounting data is changed or deleted it can create havoc in the accounting department, by calling into question the reliability or accuracy of all data. This can be frustrating to all involved so it is best to have security measure in place to prevent securitybreaches. Security breaches can consist of viruses, and worms. These security breaches are a direct result of hacking. Someone can hack into the computer system and attach viruses to emailsand other accounting files during an electronic transaction. This can interfere with program codesof the accounting system.

Measures or remedies to protect system:

1. Protect with passwords. This may seem like a no-brainer, but many cyber attacks succeed precisely because of weak password protocols. Access to all equipment, wireless networks and sensitive data should be guarded with unique user names and passwords keyed to specific individuals. The strongest passwords contain numbers, letters and symbols, and aren’t based on commonplace words, standard dictionary terms or easy-to-guess dates such as birthdays. Each user should further have a unique password wherever it appears on a device or network. If you create a master document containing all user passcodes, be sure to encrypt it with its own passcode and store it in a secure place.

2. Design safe systems. Reduce exposure to hackers and thieves by limiting access to your technology infrastructure. Minimize points of failure by eliminating unnecessary access to hardware and software, and restricting individual users’ and systems’ privileges only to needed equipment and programs. Whenever possible, minimize the scope of potential damage to your networks by using a unique set of email addresses, logins, servers and domain names for each user, work group or department as well.

Predict the major potential resulting damage(s) to the company’s financial statements from the fraud.If I wanted to commit fraud by altering my company’s accruals I would do so by hacking into their accounting system. I would put a virus in their system that would copy all passwords and log in information. The changes will be made in the accounts according to my will. Such as paying myself for time not worked, increasing my salary, giving myself bonuses. The major potential resulting damage to the company’s financial statements from the fraud would be losingthe credibility of accounts which can be devastating stockholders and investors.

major damages to the company’s financial statements could result from such a fraud”

a. Financial statement fraud can result in the loss of confidence in the companies by customers, shareholders, potential shareholders, and lenders. This in turn can lead to financial collapse and massive losses to shareholders.

b. The damage is the same as to shareholders, except the shareholders are the ones who bear the ultimate loss. However, company employees can lose their jobs, and pension funds can be destroyed, leaving employees with no money to retire.

c. Executives and directors can have their reputations permanently damaged; they can lose their pension funds along with regular company employees, they can lose their jobs; they can be permanently barred by the SEC from serving as officers in public companies, and they can be fined an given prison sentences.

d. Investors can lose confidence in the market as a whole. This might cause the flight of capital to other markets.

e. Society is served by orderly financial markets. They are essential to the formation and distribution of capital in the economy. Damage to the markets, and damage to shareholders and lenders, damages society as a whole.


Related Solutions

"Accounting Methods and Inventories" Please respond to the following: Using the Internet or Strayer databases, research...
"Accounting Methods and Inventories" Please respond to the following: Using the Internet or Strayer databases, research an example of fraud by inventory misstatement for a public company in the last five (5) years. Next, explain this incident, including the particulars of how the fraud was achieved and how it was detected. Research clearly shows that whistleblowers are the best detection method. Explain the role whistleblowers played in the fraud example you selected previously, or how a whistleblower would have enhanced...
For this week's discussion, please choose any or all of the following topics. In business contexts,...
For this week's discussion, please choose any or all of the following topics. In business contexts, there is frequently a divide between those who analyze, and the consumers of analytics. What are some of the challenges both analysts and consumers of analytics face when working toward becoming analytic competitors? As an analytic professional, what might you take into account if you were tasked with prioritizing new initiatives for your organization? What factors might influence what initiatives take precedent? Alfred Korzybski...
Please respond to EACH of the following discussion topics and submit them to the discussion forum...
Please respond to EACH of the following discussion topics and submit them to the discussion forum as a single post. Your initial post should be 75-150 words in length.Then, make at least two thoughtful responses to your fellow students’ posts. If you haven’t recently, please review the Rules of Discussion. The Questioning Toolkit identified 17 kinds of questions: Essential question Organizing question Elaborating question Divergent question Subsidiary question Probing question Unanswerable question Irrelevant question Hypothetical question Sorting and Sifting question...
Egocentricity Please respond to EACH of the following discussion topics and submit them to the discussion...
Egocentricity Please respond to EACH of the following discussion topics and submit them to the discussion forum as a single post. Your initial post should be 75-150 words in length.Then, make at least two thoughtful responses to your fellow students’ posts. If you haven’t recently, please review the Rules of Discussion. Take the Egocentricity Quiz: http://home.earthlink.net/~bmgei/educate/docs/aperson/thinking/ego-quiz.htm If you scored more than nine, read “If you are egocentric, what can you do?” at this website: http://home.earthlink.net/~bmgei/educate/docs/aperson/thinking/kill-ego.htm Pick one characteristic from the...
Respond to the following in a minimum of 175 words: Accounting information systems are designed to...
Respond to the following in a minimum of 175 words: Accounting information systems are designed to collect and process transaction data and communicate the financial information to concerned parties. The design of a number of types of accounting information systems vary significantly. A number of factors influence the design of these systems, such as the size of the business, the type of business, the volume of data, the type of data management needs, and other factors. Discuss three broad categories...
This week's discussion will require a little research. Find a Internet search for "how to lie...
This week's discussion will require a little research. Find a Internet search for "how to lie with statistics." In addition to many references to Darrell Huff's classic book How to Lie with Statistics, you will find sites that explain how to use statistics to mislead your audience. Find an article that interests you and report on your findings. Provide several examples and include appropriate references. Why do you think that statistics are sometimes used to give misleading information?
Lesson Two Discussion Question: Please respond to the following discussion American political history can be understood...
Lesson Two Discussion Question: Please respond to the following discussion American political history can be understood as a perennial battle between state power and national power. In recent times, the COVID-19 pandemic is perhaps the greatest instance of this conceptual struggle. Refer to the case analysis from the reading material "Federalism in Action: Case Studies". Should more or less power be given to the national government than currently exists? Explain your answer using relevant topics and arguments (for example, debates...
"Ethics in Management Accounting versus Financial Accounting" Please respond to the following: Go to the American...
"Ethics in Management Accounting versus Financial Accounting" Please respond to the following: Go to the American Institute of Certified Public Accountants (AICPA) Website to read the current AICPA code of professional conduct, located at http://www.aicpa.org/Research/Standards/CodeofConduct/Pages/default.aspx. Next, assess the effectiveness of the current Institute of Management Accountants (IMA) code of professional conduct in promoting ethical behavior and providing guidance for the dilemmas managerial accountants are confronted with today. In your assessment, compare the IMA code of conduct to the AICPA code...
Ethical Reasoning Please respond to EACH of the following discussion topics and submit them to the...
Ethical Reasoning Please respond to EACH of the following discussion topics and submit them to the discussion forum as a single post. Your initial post should be 75-150 words in length.Then, make at least two thoughtful responses to your fellow students’ posts. If you haven’t recently, please review the Rules of Discussion. Start with the types of ethical reasoning discussed in the reading. Describe an ethical decision in your life, and identify its type (utilitarian, egoism, deontology, relativism, justice) and...
Please respond to the following discussion. A manager at a “Check Into Cash” business defends his...
Please respond to the following discussion. A manager at a “Check Into Cash” business defends his business practice as simply “charging what the market will bear.” “After all,” says the manager, “we don’t force people to come in the door.”< span style="mso-spacerun: yes"> How would you respond to this ethical defense of the payday-advance business?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT