Cybersecurity Measures for Businesses
VerifiedAdded on 2020/04/01
|7
|1456
|41
AI Summary
The assignment analyzes the impact of a global ransomware attack that affected 99 countries. It emphasizes the need for Motherboards and More Pty Ltd to implement robust cybersecurity strategies. The document recommends solutions like antivirus software, employee security awareness programs, regular data backups, and timely application of system patches to prevent future attacks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ACCOUNTING INFORMATION SYSTEMS
Accounting Information Systems
Name of the student
Name of the University
Student Id
Author Note
Accounting Information Systems
Name of the student
Name of the University
Student Id
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ACCOUNTING INFORMATION SYSTEMS
Executive summary
The following report discusses about the operational problems as well as the need for security
measures in the company. The chosen company is the Motherboards and More Pty Ltd. The
various weaknesses in their operations are analyzed and the respective solutions for that are also
provided in the report. In addition, the biggest ransomware attack overview is also discussed in
this report.
Executive summary
The following report discusses about the operational problems as well as the need for security
measures in the company. The chosen company is the Motherboards and More Pty Ltd. The
various weaknesses in their operations are analyzed and the respective solutions for that are also
provided in the report. In addition, the biggest ransomware attack overview is also discussed in
this report.
2ACCOUNTING INFORMATION SYSTEMS
Table of Contents
Introduction:....................................................................................................................................3
Discussion:.......................................................................................................................................3
1. Overview of the revenue cycle:...............................................................................................3
2. Identification of the internal control weakness:.......................................................................3
3. Ransomware attack overview:.................................................................................................4
4. Mitigation of the attacks:.........................................................................................................5
Conclusion:......................................................................................................................................5
References:......................................................................................................................................7
Table of Contents
Introduction:....................................................................................................................................3
Discussion:.......................................................................................................................................3
1. Overview of the revenue cycle:...............................................................................................3
2. Identification of the internal control weakness:.......................................................................3
3. Ransomware attack overview:.................................................................................................4
4. Mitigation of the attacks:.........................................................................................................5
Conclusion:......................................................................................................................................5
References:......................................................................................................................................7
3ACCOUNTING INFORMATION SYSTEMS
Introduction:
The following report discusses about the problem of the revenue cycle. Furthermore, the
various internal control weaknesses as depicted from the revenue cycle operations is used to
identify and recommend various solutions for the business to apply them. In addition, the impact
of ransomware attacks in the world whose effect was devastating is also referenced in this report.
Discussion:
1. Overview of the revenue cycle:
The organization has their very own website which the customers use to place order
which is done by utilizing the phone numbers or the email id of the company. The main sales
made by the company for the recent years were supposed to be in credit. The requested orders
are always sent to the docks to be shipped away. Usually, the dock is used for both the receiving
and the shipping sections of the company. The orders to be sent are usually placed in an
alphabetical order in the dock. However, the recent year of the company resulted in many sales
which were the sole reason for blunders happening in operations. The effects of such operations
were delay in shipment and wrong order being sent to the customers.
2. Identification of the internal control weakness:
Internal control weaknesses Impact Mitigation
Purchase on credits: As the
increased sales of the company
was basically through credit, less
profit acquisition was made due
to this.
Hindrance in sales operation for
the first month: As the profit of
the products is received after a
month, the operations of the
company are much affected by
such methods.
Review of credit scores: This
requires the company to apply for
partnership with a financial
company to assess the credit
reports of the customers
involved.
Shipment using the same dock:
This can lead to problems if the
products are exchanged by
Losing count during high sales
activity: In case the items to be
shipped and the items to be
Tracking of delivery services by
using software solution: This can
be facilitated by hiring
Introduction:
The following report discusses about the problem of the revenue cycle. Furthermore, the
various internal control weaknesses as depicted from the revenue cycle operations is used to
identify and recommend various solutions for the business to apply them. In addition, the impact
of ransomware attacks in the world whose effect was devastating is also referenced in this report.
Discussion:
1. Overview of the revenue cycle:
The organization has their very own website which the customers use to place order
which is done by utilizing the phone numbers or the email id of the company. The main sales
made by the company for the recent years were supposed to be in credit. The requested orders
are always sent to the docks to be shipped away. Usually, the dock is used for both the receiving
and the shipping sections of the company. The orders to be sent are usually placed in an
alphabetical order in the dock. However, the recent year of the company resulted in many sales
which were the sole reason for blunders happening in operations. The effects of such operations
were delay in shipment and wrong order being sent to the customers.
2. Identification of the internal control weakness:
Internal control weaknesses Impact Mitigation
Purchase on credits: As the
increased sales of the company
was basically through credit, less
profit acquisition was made due
to this.
Hindrance in sales operation for
the first month: As the profit of
the products is received after a
month, the operations of the
company are much affected by
such methods.
Review of credit scores: This
requires the company to apply for
partnership with a financial
company to assess the credit
reports of the customers
involved.
Shipment using the same dock:
This can lead to problems if the
products are exchanged by
Losing count during high sales
activity: In case the items to be
shipped and the items to be
Tracking of delivery services by
using software solution: This can
be facilitated by hiring
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4ACCOUNTING INFORMATION SYSTEMS
chance. returned are mixed by chance,
the customers can get wrong
delivery.
authorities to streamline the
sending or receiving operations
or the application of commercial
applications like One Time 360.
Absence of a database: The
absence of databases to keep the
records of the returned as well as
shipped items is another cause
for weaknesses to be persistent in
the company.
Discrepancies in manual
recordings: In case of high sales
made by the company, these
manual recordings may be the
cause of problems.
Application of a database
solution: This will help in
recording all the products with
their name and id.
High discount in return: As a
result, the customers facing
return issues are opting for this
policy which is reducing the
profit margin of the company.
Customers always opting for this
method leading to less profit:
Increased discount rates are the
cause for less profit acquisitions
which leads to less performance.
Needs to apply alternative
solutions: To address this, the
company needs to come up with
good strategies to be used.
3. Ransomware attack overview:
The ransomware attack was considered the greatest cyber attack associated with the
entire world. The main workings of the ransomware included the encryption of the files present
in the devices that were affected. This was mainly done to limit the access to these files from the
users. The affected devices where then used to show display messages to the users regarding the
payment of 300$. This sum was to be sent to the attacker by using the bitcoin network. The
address of the bitcoin wallet was also showed with the error message. In addition, the sum that
was being showed was being increased by the attacker at regular periods ("'Biggest ransomware
flare-up ever' hits about 100 nations", 2017). Moreover, the attacker also threatened the users
regarding the doubling of the amount in case the sum was not being paid in 3 days. The sector
which was mostly affected was the healthcare sectors that were forced to neglect treatment even
to the critical patients due to the lack of access to their records.
chance. returned are mixed by chance,
the customers can get wrong
delivery.
authorities to streamline the
sending or receiving operations
or the application of commercial
applications like One Time 360.
Absence of a database: The
absence of databases to keep the
records of the returned as well as
shipped items is another cause
for weaknesses to be persistent in
the company.
Discrepancies in manual
recordings: In case of high sales
made by the company, these
manual recordings may be the
cause of problems.
Application of a database
solution: This will help in
recording all the products with
their name and id.
High discount in return: As a
result, the customers facing
return issues are opting for this
policy which is reducing the
profit margin of the company.
Customers always opting for this
method leading to less profit:
Increased discount rates are the
cause for less profit acquisitions
which leads to less performance.
Needs to apply alternative
solutions: To address this, the
company needs to come up with
good strategies to be used.
3. Ransomware attack overview:
The ransomware attack was considered the greatest cyber attack associated with the
entire world. The main workings of the ransomware included the encryption of the files present
in the devices that were affected. This was mainly done to limit the access to these files from the
users. The affected devices where then used to show display messages to the users regarding the
payment of 300$. This sum was to be sent to the attacker by using the bitcoin network. The
address of the bitcoin wallet was also showed with the error message. In addition, the sum that
was being showed was being increased by the attacker at regular periods ("'Biggest ransomware
flare-up ever' hits about 100 nations", 2017). Moreover, the attacker also threatened the users
regarding the doubling of the amount in case the sum was not being paid in 3 days. The sector
which was mostly affected was the healthcare sectors that were forced to neglect treatment even
to the critical patients due to the lack of access to their records.
5ACCOUNTING INFORMATION SYSTEMS
4. Mitigation of the attacks:
Due to the ransomware attack, the number of the most affected countries was 99. This is
the main reason for Motherboards and More Pty Ltd to reference their needs in addressing the
security needs (Sittig & Singh, 2016).
The first risk mitigation procedure that can be applied by the company is the acquirement
of an antivirus program. These programs are a much recognized tool for identifying the presence
of any malwares or viruses in the system. These programs can be found commercially.
The next mitigation technique that can be addressed by the company is the increase in
security awareness among the employees. The main process involved in such sections is the
awareness to malwares or phishing attacks.
The next method that can be applied is the backing up of data. In cases of disaster in the
system like cyber threat or natural disasters, the data that is backed up can be used to get the
system online without wasting time (Sittig & Singh, 2016).
As the main reason of the ransomware attack was the absence of applied patches in the
operating system of the infected users, the requirement for patches in the system is a necessary.
Conclusion:
Due to the ransomware attack, the number of the most affected countries was 99. This is
the main reason for the Motherboards and More Pty Ltd to implement the security issues that
may arise due to such actions. It is thus concluded from the report that the company needs to
analyze the findings of the report and apply them to address their operations and securities.
4. Mitigation of the attacks:
Due to the ransomware attack, the number of the most affected countries was 99. This is
the main reason for Motherboards and More Pty Ltd to reference their needs in addressing the
security needs (Sittig & Singh, 2016).
The first risk mitigation procedure that can be applied by the company is the acquirement
of an antivirus program. These programs are a much recognized tool for identifying the presence
of any malwares or viruses in the system. These programs can be found commercially.
The next mitigation technique that can be addressed by the company is the increase in
security awareness among the employees. The main process involved in such sections is the
awareness to malwares or phishing attacks.
The next method that can be applied is the backing up of data. In cases of disaster in the
system like cyber threat or natural disasters, the data that is backed up can be used to get the
system online without wasting time (Sittig & Singh, 2016).
As the main reason of the ransomware attack was the absence of applied patches in the
operating system of the infected users, the requirement for patches in the system is a necessary.
Conclusion:
Due to the ransomware attack, the number of the most affected countries was 99. This is
the main reason for the Motherboards and More Pty Ltd to implement the security issues that
may arise due to such actions. It is thus concluded from the report that the company needs to
analyze the findings of the report and apply them to address their operations and securities.
6ACCOUNTING INFORMATION SYSTEMS
References:
'Biggest ransomware outbreak in history' hits nearly 100 countries. (2017). ABC News.
Retrieved 14 September 2017, from http://www.abc.net.au/news/2017-05-13/biggest-
ransomware-outbreak-in-history-hits-nearly-100-nations/8523102
Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network
Security, 2016(9), 5-9.
Chen, J. S., & Tsou, H. T. (2012). Performance effects of IT capability, service process
innovation, and the mediating role of customer service. Journal of Engineering and
Technology Management, 29(1), 71-94.
Courier Software & Delivery Dispatch - OnTime 360. (2017). Ontime360.com. Retrieved 14
September 2017, from https://www.ontime360.com/
Pathak, D. P., & Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing
challenge. International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume, 5.
Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and
recovering from ransomware attacks. Applied clinical informatics, 7(2), 624.
Teixeira, J., Patrício, L., Nunes, N. J., Nóbrega, L., Fisk, R. P., & Constantine, L. (2012).
Customer experience modeling: from customer experience to service design. Journal of
Service Management, 23(3), 362-376.
Zurich, L. B. (2017). Service Operations and Management.
References:
'Biggest ransomware outbreak in history' hits nearly 100 countries. (2017). ABC News.
Retrieved 14 September 2017, from http://www.abc.net.au/news/2017-05-13/biggest-
ransomware-outbreak-in-history-hits-nearly-100-nations/8523102
Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network
Security, 2016(9), 5-9.
Chen, J. S., & Tsou, H. T. (2012). Performance effects of IT capability, service process
innovation, and the mediating role of customer service. Journal of Engineering and
Technology Management, 29(1), 71-94.
Courier Software & Delivery Dispatch - OnTime 360. (2017). Ontime360.com. Retrieved 14
September 2017, from https://www.ontime360.com/
Pathak, D. P., & Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing
challenge. International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume, 5.
Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and
recovering from ransomware attacks. Applied clinical informatics, 7(2), 624.
Teixeira, J., Patrício, L., Nunes, N. J., Nóbrega, L., Fisk, R. P., & Constantine, L. (2012).
Customer experience modeling: from customer experience to service design. Journal of
Service Management, 23(3), 362-376.
Zurich, L. B. (2017). Service Operations and Management.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.