Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses...

1 answer below »

In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.

For this assignment, research the Internet or Strayer databases and select a company whose database systems have been hacked.

Write a five to seven (5-7) page paper in which you:

  1. Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
  2. Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
  3. Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
  4. Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Answered Same Day Dec 26, 2021

Solution

Robert answered on Dec 26 2021
122 Votes
Evaluation Of The Level Of Responsibility Of The Company In Terms Of The Effectiveness Of
The Response To The Security Breach With The Rationale
Hyatt Hotels Corporation did identify the malware on its payment gateway system and the
system was being deployed at lot of locations across the globe (Buhajla, J., 2015; D'Agostino Jr,
V. J., 2016). The malware had affected more than 250 locations for the hotel chain.
The collection of credit card information was the prime basis based on which the hotel
corporation had been hacked (DeFranco, A., & Morosan, C., 2017; NBC News, 2016;
D'Agostino Jr, V. J., 2016).. In response to the security
each having taken place, Hyatt Hotels
Corporation organized the analysis system to identify the most serious threat prevailing on
internet
The prevention of communication from the infected users based on the network side was a step
which the hotel Corporation took along with the destinations of malware communication existing
on its portals (Wattles, J., 2015).
The dynamic analysis was utilized and the remote HTTP detected to identify whether the
strategy deployed was effective enough in Command & Control (Faulk, R., 2015; DeFranco, A., &
Morosan, C., 2017).
The effectiveness of the response did also include sending across the communication to clients
on their respective email ids and warning for the
each while asking to need for taking
additional precautions.
Assessment Of The Level Of Responsibility Of The Software Provider To Both The Business
And Its Clients With Rationale
The responsibility of the software provider of the accounting system lies in the collection and
eporting of information that has been impacted due to the attack (Seethamraju, R., 2015; Pollock,
N., & Hyysalo, S., 2014; Goode, S., Lin, C., Tsai, J. C., & Jiang, J. J., 2015). The cost allocation
method is the crucial arena which needs relevant controlling for the business and clients.
The responsibility for the third party can extent to review of information and the impact analyzed
with the solution provisioned along with the estimate based on further analysis. The procurement
analysis is an identified area which the third party will need to constantly monitor for the impact
and the relevant information that can be safely restored (Seethamraju, R., 2015; Pollock, N., &
Hyysalo, S., 2014; Goode, S., Lin, C., Tsai, J. C., & Jiang, J. J., 2015).
Argument For Additional Regulation As A Preventative Measure Against Businesses Being
Hacked
An additional regulation acting as a preventive measure against the businesses which are being
hacked consists of dynamic analysis (Jones, A. S., & Gagneja, K., 2016; Jouguet, P., Diamanti, E., &
Kunz-Jacques, S., 2014).
This is done on the prevailing environment and the various portals of the business which can be
impacted.
It is necessary to analyze the destination and determining whether malware downloading and
connection with the servers can be prevented with the additional security measures deployed to
prevent malware or any other cyber-attack (Hall, E., 2016;...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here