Ransomware Outbreak Analysis for Motherboards and More Pty Ltd
VerifiedAdded on  2020/03/28
|9
|1563
|58
Report
AI Summary
This report, prepared for the CFO of Motherboards and More Pty Ltd, analyzes the impact of a recent ransomware outbreak on the company's accounting information system. It begins with an executive summary and an introduction that outlines the report's objectives, which include assessing the revenue cycle, identifying system threats, and providing recommendations to mitigate the impact of the ransomware attack. The report details the company's revenue cycle, emphasizing payment methods, order processing, and inventory management. It identifies internal control weaknesses, such as the lack of physical inventory counts and reliance on credit card payments, and discusses the impact of these weaknesses. An overview of the ransomware attack is provided, explaining its spread, the ransom demands, and the vulnerabilities exploited. The report concludes with recommendations, including the use of RFID tags for inventory tracking, to improve security and prevent future attacks. The report references several academic sources to support its analysis and recommendations.

Running head: ACCOUNTING INFORMATION SYSTEM
ACCOUNTING INFORMATION SYSTEM
Name of the Student
Name of the University
Author Note
ACCOUNTING INFORMATION SYSTEM
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2ACCOUNTING INFORMATION SYSTEM
Executive summary
This report deals with recent outbreak of the ransom ware attack. The report is for the CFO of
Motherboards and More Pty Ltd. He has also requested for completing a task with the
reviewing of the Revenue cycle and providing advice to management regarding the recent
‘Ransomware Outbreak’ in May 2017.The report has a detailed description of the revenue
cycle that the organization follows, identification of the threats which the current system has,
overview of the working of the ransom ware attack, and recommendation for the organization
on how to combat the drawbacks in their system.
Executive summary
This report deals with recent outbreak of the ransom ware attack. The report is for the CFO of
Motherboards and More Pty Ltd. He has also requested for completing a task with the
reviewing of the Revenue cycle and providing advice to management regarding the recent
‘Ransomware Outbreak’ in May 2017.The report has a detailed description of the revenue
cycle that the organization follows, identification of the threats which the current system has,
overview of the working of the ransom ware attack, and recommendation for the organization
on how to combat the drawbacks in their system.

3ACCOUNTING INFORMATION SYSTEM
Introduction
The main aim of the report is to focus on the aspect of ransomware attack which has
recently. The working of the threat of the ransom ware attack and with the attack the
recommendation for the company is put forward. The main emphasis of the report is a
detailed description of the revenue cycle that is mainly followed by the organizations with it
identification of the threads which is incorporated in the system which is followed by the
organization.
Overview of the Revenue Cycle
The main functionality of the company is the manufacture of motherboard, card and
microchips graphics repairs across the Australia in a central city and the departments are
located on the outskirts of the town (Wells &Bravender, 2016). Being a small enterprise
company the revenue system which is followed by the company is very much precise.
The main feature which is incorporated by the company involve payment through a
credit card with the use of the online website of the company. The order is invoiced and the
main order is send to the ware house in order to the packing of the goods. The service of the
customer is mainly done through the alphabetical manner. The source number is usually
twenty in number and the overall orders which are going out is mainly more than that. When
there is loss of any product the process which is incurred is that the item is logged into a log
book in order to get updated into the record.
Introduction
The main aim of the report is to focus on the aspect of ransomware attack which has
recently. The working of the threat of the ransom ware attack and with the attack the
recommendation for the company is put forward. The main emphasis of the report is a
detailed description of the revenue cycle that is mainly followed by the organizations with it
identification of the threads which is incorporated in the system which is followed by the
organization.
Overview of the Revenue Cycle
The main functionality of the company is the manufacture of motherboard, card and
microchips graphics repairs across the Australia in a central city and the departments are
located on the outskirts of the town (Wells &Bravender, 2016). Being a small enterprise
company the revenue system which is followed by the company is very much precise.
The main feature which is incorporated by the company involve payment through a
credit card with the use of the online website of the company. The order is invoiced and the
main order is send to the ware house in order to the packing of the goods. The service of the
customer is mainly done through the alphabetical manner. The source number is usually
twenty in number and the overall orders which are going out is mainly more than that. When
there is loss of any product the process which is incurred is that the item is logged into a log
book in order to get updated into the record.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4ACCOUNTING INFORMATION SYSTEM
Figure 1: Level 0 flow diagram
(Source: By Author)
Identification of threats
The following table mainly discuss about the threats that are faced by the company
Internal Control Weaknesses There is no physical counting of the
inventory items.
Impact These Weaknesses If the items are not kept a track of then if
something gets lost then it will not be found
Specific Internal Controls Tagging the items in the inventory and then
keeping a track of the location the item was
Figure 1: Level 0 flow diagram
(Source: By Author)
Identification of threats
The following table mainly discuss about the threats that are faced by the company
Internal Control Weaknesses There is no physical counting of the
inventory items.
Impact These Weaknesses If the items are not kept a track of then if
something gets lost then it will not be found
Specific Internal Controls Tagging the items in the inventory and then
keeping a track of the location the item was
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5ACCOUNTING INFORMATION SYSTEM
last stored can help in the tracking of the
lost items. Also keeping an active
connective closed circuit camera would help
in looking after the warehouse floor (Sittig&
Singh, 2016).
The factor of source of time can be a factor by which the organisation is facing
internal weakness. One of the major factor of concern is the allowance of the customer to buy
goods online through the use of credit. The use of dock for the incoming and the outgoing
delivery of the item can be indicated as the second point of emphasis, this related to problem
creation within the operation of the organization. In any organization the database in order to
keep the record of the customers plays a vital role , the company lags behind in this field
(Kharraz et al., 2015).
Impact of the weakness
In any organization the database in order to keep the record of the customers plays a
vital role, the company lags behind in this field (Kharraz et al., 2015). In the process of not
keeping the record when the size of the item increase. On the other hand, the customers get a
free trial of 30days this puts high stress on the working team and also on the financial aspect
of the company. The use of dock for the outgoing and incoming delivery of the item can be
stated as a point of concern.
last stored can help in the tracking of the
lost items. Also keeping an active
connective closed circuit camera would help
in looking after the warehouse floor (Sittig&
Singh, 2016).
The factor of source of time can be a factor by which the organisation is facing
internal weakness. One of the major factor of concern is the allowance of the customer to buy
goods online through the use of credit. The use of dock for the incoming and the outgoing
delivery of the item can be indicated as the second point of emphasis, this related to problem
creation within the operation of the organization. In any organization the database in order to
keep the record of the customers plays a vital role , the company lags behind in this field
(Kharraz et al., 2015).
Impact of the weakness
In any organization the database in order to keep the record of the customers plays a
vital role, the company lags behind in this field (Kharraz et al., 2015). In the process of not
keeping the record when the size of the item increase. On the other hand, the customers get a
free trial of 30days this puts high stress on the working team and also on the financial aspect
of the company. The use of dock for the outgoing and incoming delivery of the item can be
stated as a point of concern.

6ACCOUNTING INFORMATION SYSTEM
Overview of the Ransom ware attack
The main factor which caused the problem was a self-replicating software piece that
mainly took advantage of the different vulnerabilities with the main focus on older versions
of Microsoft windows. Finding an exposed target, it spreads from system to system. the
attack of the ransom ware resulted in demand of ransom which varied from an amount of
$US300 and it mainly accompanied increase in amount on an hourly basis. The security holes
where disclosed several weeks after by the shadow brokers, this group was a mysterious
group that mainly published different hacking tools which was used by the NSA (Collier,
2017). Right after the discloser the Microsoft company issued software’s which mainly
included the patches which was made for the loop holes. On the other hand, it can also be
stated that many companies did bot install the patches or used older versions of the operating
system which did not support the patches which was oriented to protect the system
(Mohurle&Patil, 2017).
The most disruptive kind of attack was targeted towards the clinics and the hospital
which were in Britain. The case forced to turn away patients after the access of the computer
system was not allowed due to the attack. There were many other countries which were
involved in the attack for example Spain, Russia, Portugal. Cyber extortionist mainly ticked
the victims in order to open malicious attachment which had the malware in order to spam
emails that mainly appear to be contained in job offers, invoices, warning which are related to
security and other files of legitimate.
Recommendations
From the above discussion it can be stated that the most important aspect that is
related to the problem is that is the company Motherboard and Pvt Ltd faces problem with the
tracking of the goods in their warehouse. The items have been tagged and kept in the shelf.
Overview of the Ransom ware attack
The main factor which caused the problem was a self-replicating software piece that
mainly took advantage of the different vulnerabilities with the main focus on older versions
of Microsoft windows. Finding an exposed target, it spreads from system to system. the
attack of the ransom ware resulted in demand of ransom which varied from an amount of
$US300 and it mainly accompanied increase in amount on an hourly basis. The security holes
where disclosed several weeks after by the shadow brokers, this group was a mysterious
group that mainly published different hacking tools which was used by the NSA (Collier,
2017). Right after the discloser the Microsoft company issued software’s which mainly
included the patches which was made for the loop holes. On the other hand, it can also be
stated that many companies did bot install the patches or used older versions of the operating
system which did not support the patches which was oriented to protect the system
(Mohurle&Patil, 2017).
The most disruptive kind of attack was targeted towards the clinics and the hospital
which were in Britain. The case forced to turn away patients after the access of the computer
system was not allowed due to the attack. There were many other countries which were
involved in the attack for example Spain, Russia, Portugal. Cyber extortionist mainly ticked
the victims in order to open malicious attachment which had the malware in order to spam
emails that mainly appear to be contained in job offers, invoices, warning which are related to
security and other files of legitimate.
Recommendations
From the above discussion it can be stated that the most important aspect that is
related to the problem is that is the company Motherboard and Pvt Ltd faces problem with the
tracking of the goods in their warehouse. The items have been tagged and kept in the shelf.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7ACCOUNTING INFORMATION SYSTEM
The items should be tagged and number with the help of a radio frequency identification tags
(RFID). This would help in knowing the location of the product and if an unauthorized way
were taken up to take the item out of the warehouse then the tags would help in informing the
authorities about the item being taking out of the warehouse (Gupta &Tripathi, 2017).
Conclusion
It can be concluded from the report that the ransom ware attack on the organization
has faced many loss of data in aspect to the financial condition and related to the company.
The detailed study of the case study is mainly based on the drawback which is related to the
technical drawback related to the warehouse.
The items should be tagged and number with the help of a radio frequency identification tags
(RFID). This would help in knowing the location of the product and if an unauthorized way
were taken up to take the item out of the warehouse then the tags would help in informing the
authorities about the item being taking out of the warehouse (Gupta &Tripathi, 2017).
Conclusion
It can be concluded from the report that the ransom ware attack on the organization
has faced many loss of data in aspect to the financial condition and related to the company.
The detailed study of the case study is mainly based on the drawback which is related to the
technical drawback related to the warehouse.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8ACCOUNTING INFORMATION SYSTEM
References
Andronio, N., Zanero, S., & Maggi, F. (2015, November). Heldroid: Dissecting and detecting
mobile ransomware. In International Workshop on Recent Advances in Intrusion
Detection (pp. 382-404). Springer International Publishing.
Everett, C. (2016). Ransomware: to pay or not to pay? Computer Fraud & Security, 2016(4),
8-12.
Faruki, P., Laxmi, V., Gaur, M. S., & Vinod, P. (2012, October). Mining control flow graph
as API call-grams to detect portable executable malware. In Proceedings of the Fifth
International Conference on Security of Information and Networks (pp. 130-137).
ACM.
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015, July). Cutting the
gordian knot: A look under the hood of ransomware attacks. In International
Conference on Detection of Intrusions and Malware, and Vulnerability
Assessment (pp. 3-24). Springer, Cham.
Mercaldo, F., Nardone, V., Santone, A., & Visaggio, C. A. (2016, June). Ransomware steals
your phone. formal methods rescue it. In International Conference on Formal
Techniques for Distributed Objects, Components, and Systems (pp. 212-221).
Springer, Cham.
O'Gorman, G., & McDonald, G. (2012). Ransomware: A growing menace. Symantec
Corporation.
Pathak, D. P., & Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware
growing challenge. International Journal of Advanced Research in Computer
Engineering & Technology (IJARCET) Volume, 5.
References
Andronio, N., Zanero, S., & Maggi, F. (2015, November). Heldroid: Dissecting and detecting
mobile ransomware. In International Workshop on Recent Advances in Intrusion
Detection (pp. 382-404). Springer International Publishing.
Everett, C. (2016). Ransomware: to pay or not to pay? Computer Fraud & Security, 2016(4),
8-12.
Faruki, P., Laxmi, V., Gaur, M. S., & Vinod, P. (2012, October). Mining control flow graph
as API call-grams to detect portable executable malware. In Proceedings of the Fifth
International Conference on Security of Information and Networks (pp. 130-137).
ACM.
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015, July). Cutting the
gordian knot: A look under the hood of ransomware attacks. In International
Conference on Detection of Intrusions and Malware, and Vulnerability
Assessment (pp. 3-24). Springer, Cham.
Mercaldo, F., Nardone, V., Santone, A., & Visaggio, C. A. (2016, June). Ransomware steals
your phone. formal methods rescue it. In International Conference on Formal
Techniques for Distributed Objects, Components, and Systems (pp. 212-221).
Springer, Cham.
O'Gorman, G., & McDonald, G. (2012). Ransomware: A growing menace. Symantec
Corporation.
Pathak, D. P., & Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware
growing challenge. International Journal of Advanced Research in Computer
Engineering & Technology (IJARCET) Volume, 5.

9ACCOUNTING INFORMATION SYSTEM
Song, S., Kim, B., & Lee, S. (2016). The effective ransomware prevention technique using
process monitoring on android platform. Mobile Information Systems, 2016.
Song, S., Kim, B., & Lee, S. (2016). The effective ransomware prevention technique using
process monitoring on android platform. Mobile Information Systems, 2016.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.