Accounting Information Systems Report: Ransomware Attack and Solutions
VerifiedAdded on 2020/04/01
|7
|1456
|41
Report
AI Summary
This report examines the accounting information systems of Motherboards and More Pty Ltd, focusing on operational challenges and security needs. It analyzes the company's revenue cycle, identifying internal control weaknesses like credit sales, shipment issues, and database deficiencies. The report suggests mitigation strategies such as credit score assessments, software solutions for tracking deliveries, and implementing a comprehensive database. Furthermore, it provides an overview of a major ransomware attack, detailing its impact and the importance of security measures. The report concludes with recommendations for the company to address its operational and security concerns, including acquiring antivirus programs, enhancing employee security awareness, backing up data, and applying system patches to mitigate future risks. The report emphasizes the need for a proactive approach to cybersecurity and operational efficiency.

Running head: ACCOUNTING INFORMATION SYSTEMS
Accounting Information Systems
Name of the student
Name of the University
Student Id
Author Note
Accounting Information Systems
Name of the student
Name of the University
Student Id
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1ACCOUNTING INFORMATION SYSTEMS
Executive summary
The following report discusses about the operational problems as well as the need for security
measures in the company. The chosen company is the Motherboards and More Pty Ltd. The
various weaknesses in their operations are analyzed and the respective solutions for that are also
provided in the report. In addition, the biggest ransomware attack overview is also discussed in
this report.
Executive summary
The following report discusses about the operational problems as well as the need for security
measures in the company. The chosen company is the Motherboards and More Pty Ltd. The
various weaknesses in their operations are analyzed and the respective solutions for that are also
provided in the report. In addition, the biggest ransomware attack overview is also discussed in
this report.

2ACCOUNTING INFORMATION SYSTEMS
Table of Contents
Introduction:....................................................................................................................................3
Discussion:.......................................................................................................................................3
1. Overview of the revenue cycle:...............................................................................................3
2. Identification of the internal control weakness:.......................................................................3
3. Ransomware attack overview:.................................................................................................4
4. Mitigation of the attacks:.........................................................................................................5
Conclusion:......................................................................................................................................5
References:......................................................................................................................................7
Table of Contents
Introduction:....................................................................................................................................3
Discussion:.......................................................................................................................................3
1. Overview of the revenue cycle:...............................................................................................3
2. Identification of the internal control weakness:.......................................................................3
3. Ransomware attack overview:.................................................................................................4
4. Mitigation of the attacks:.........................................................................................................5
Conclusion:......................................................................................................................................5
References:......................................................................................................................................7
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3ACCOUNTING INFORMATION SYSTEMS
Introduction:
The following report discusses about the problem of the revenue cycle. Furthermore, the
various internal control weaknesses as depicted from the revenue cycle operations is used to
identify and recommend various solutions for the business to apply them. In addition, the impact
of ransomware attacks in the world whose effect was devastating is also referenced in this report.
Discussion:
1. Overview of the revenue cycle:
The organization has their very own website which the customers use to place order
which is done by utilizing the phone numbers or the email id of the company. The main sales
made by the company for the recent years were supposed to be in credit. The requested orders
are always sent to the docks to be shipped away. Usually, the dock is used for both the receiving
and the shipping sections of the company. The orders to be sent are usually placed in an
alphabetical order in the dock. However, the recent year of the company resulted in many sales
which were the sole reason for blunders happening in operations. The effects of such operations
were delay in shipment and wrong order being sent to the customers.
2. Identification of the internal control weakness:
Internal control weaknesses Impact Mitigation
Purchase on credits: As the
increased sales of the company
was basically through credit, less
profit acquisition was made due
to this.
Hindrance in sales operation for
the first month: As the profit of
the products is received after a
month, the operations of the
company are much affected by
such methods.
Review of credit scores: This
requires the company to apply for
partnership with a financial
company to assess the credit
reports of the customers
involved.
Shipment using the same dock:
This can lead to problems if the
products are exchanged by
Losing count during high sales
activity: In case the items to be
shipped and the items to be
Tracking of delivery services by
using software solution: This can
be facilitated by hiring
Introduction:
The following report discusses about the problem of the revenue cycle. Furthermore, the
various internal control weaknesses as depicted from the revenue cycle operations is used to
identify and recommend various solutions for the business to apply them. In addition, the impact
of ransomware attacks in the world whose effect was devastating is also referenced in this report.
Discussion:
1. Overview of the revenue cycle:
The organization has their very own website which the customers use to place order
which is done by utilizing the phone numbers or the email id of the company. The main sales
made by the company for the recent years were supposed to be in credit. The requested orders
are always sent to the docks to be shipped away. Usually, the dock is used for both the receiving
and the shipping sections of the company. The orders to be sent are usually placed in an
alphabetical order in the dock. However, the recent year of the company resulted in many sales
which were the sole reason for blunders happening in operations. The effects of such operations
were delay in shipment and wrong order being sent to the customers.
2. Identification of the internal control weakness:
Internal control weaknesses Impact Mitigation
Purchase on credits: As the
increased sales of the company
was basically through credit, less
profit acquisition was made due
to this.
Hindrance in sales operation for
the first month: As the profit of
the products is received after a
month, the operations of the
company are much affected by
such methods.
Review of credit scores: This
requires the company to apply for
partnership with a financial
company to assess the credit
reports of the customers
involved.
Shipment using the same dock:
This can lead to problems if the
products are exchanged by
Losing count during high sales
activity: In case the items to be
shipped and the items to be
Tracking of delivery services by
using software solution: This can
be facilitated by hiring
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4ACCOUNTING INFORMATION SYSTEMS
chance. returned are mixed by chance,
the customers can get wrong
delivery.
authorities to streamline the
sending or receiving operations
or the application of commercial
applications like One Time 360.
Absence of a database: The
absence of databases to keep the
records of the returned as well as
shipped items is another cause
for weaknesses to be persistent in
the company.
Discrepancies in manual
recordings: In case of high sales
made by the company, these
manual recordings may be the
cause of problems.
Application of a database
solution: This will help in
recording all the products with
their name and id.
High discount in return: As a
result, the customers facing
return issues are opting for this
policy which is reducing the
profit margin of the company.
Customers always opting for this
method leading to less profit:
Increased discount rates are the
cause for less profit acquisitions
which leads to less performance.
Needs to apply alternative
solutions: To address this, the
company needs to come up with
good strategies to be used.
3. Ransomware attack overview:
The ransomware attack was considered the greatest cyber attack associated with the
entire world. The main workings of the ransomware included the encryption of the files present
in the devices that were affected. This was mainly done to limit the access to these files from the
users. The affected devices where then used to show display messages to the users regarding the
payment of 300$. This sum was to be sent to the attacker by using the bitcoin network. The
address of the bitcoin wallet was also showed with the error message. In addition, the sum that
was being showed was being increased by the attacker at regular periods ("'Biggest ransomware
flare-up ever' hits about 100 nations", 2017). Moreover, the attacker also threatened the users
regarding the doubling of the amount in case the sum was not being paid in 3 days. The sector
which was mostly affected was the healthcare sectors that were forced to neglect treatment even
to the critical patients due to the lack of access to their records.
chance. returned are mixed by chance,
the customers can get wrong
delivery.
authorities to streamline the
sending or receiving operations
or the application of commercial
applications like One Time 360.
Absence of a database: The
absence of databases to keep the
records of the returned as well as
shipped items is another cause
for weaknesses to be persistent in
the company.
Discrepancies in manual
recordings: In case of high sales
made by the company, these
manual recordings may be the
cause of problems.
Application of a database
solution: This will help in
recording all the products with
their name and id.
High discount in return: As a
result, the customers facing
return issues are opting for this
policy which is reducing the
profit margin of the company.
Customers always opting for this
method leading to less profit:
Increased discount rates are the
cause for less profit acquisitions
which leads to less performance.
Needs to apply alternative
solutions: To address this, the
company needs to come up with
good strategies to be used.
3. Ransomware attack overview:
The ransomware attack was considered the greatest cyber attack associated with the
entire world. The main workings of the ransomware included the encryption of the files present
in the devices that were affected. This was mainly done to limit the access to these files from the
users. The affected devices where then used to show display messages to the users regarding the
payment of 300$. This sum was to be sent to the attacker by using the bitcoin network. The
address of the bitcoin wallet was also showed with the error message. In addition, the sum that
was being showed was being increased by the attacker at regular periods ("'Biggest ransomware
flare-up ever' hits about 100 nations", 2017). Moreover, the attacker also threatened the users
regarding the doubling of the amount in case the sum was not being paid in 3 days. The sector
which was mostly affected was the healthcare sectors that were forced to neglect treatment even
to the critical patients due to the lack of access to their records.

5ACCOUNTING INFORMATION SYSTEMS
4. Mitigation of the attacks:
Due to the ransomware attack, the number of the most affected countries was 99. This is
the main reason for Motherboards and More Pty Ltd to reference their needs in addressing the
security needs (Sittig & Singh, 2016).
The first risk mitigation procedure that can be applied by the company is the acquirement
of an antivirus program. These programs are a much recognized tool for identifying the presence
of any malwares or viruses in the system. These programs can be found commercially.
The next mitigation technique that can be addressed by the company is the increase in
security awareness among the employees. The main process involved in such sections is the
awareness to malwares or phishing attacks.
The next method that can be applied is the backing up of data. In cases of disaster in the
system like cyber threat or natural disasters, the data that is backed up can be used to get the
system online without wasting time (Sittig & Singh, 2016).
As the main reason of the ransomware attack was the absence of applied patches in the
operating system of the infected users, the requirement for patches in the system is a necessary.
Conclusion:
Due to the ransomware attack, the number of the most affected countries was 99. This is
the main reason for the Motherboards and More Pty Ltd to implement the security issues that
may arise due to such actions. It is thus concluded from the report that the company needs to
analyze the findings of the report and apply them to address their operations and securities.
4. Mitigation of the attacks:
Due to the ransomware attack, the number of the most affected countries was 99. This is
the main reason for Motherboards and More Pty Ltd to reference their needs in addressing the
security needs (Sittig & Singh, 2016).
The first risk mitigation procedure that can be applied by the company is the acquirement
of an antivirus program. These programs are a much recognized tool for identifying the presence
of any malwares or viruses in the system. These programs can be found commercially.
The next mitigation technique that can be addressed by the company is the increase in
security awareness among the employees. The main process involved in such sections is the
awareness to malwares or phishing attacks.
The next method that can be applied is the backing up of data. In cases of disaster in the
system like cyber threat or natural disasters, the data that is backed up can be used to get the
system online without wasting time (Sittig & Singh, 2016).
As the main reason of the ransomware attack was the absence of applied patches in the
operating system of the infected users, the requirement for patches in the system is a necessary.
Conclusion:
Due to the ransomware attack, the number of the most affected countries was 99. This is
the main reason for the Motherboards and More Pty Ltd to implement the security issues that
may arise due to such actions. It is thus concluded from the report that the company needs to
analyze the findings of the report and apply them to address their operations and securities.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6ACCOUNTING INFORMATION SYSTEMS
References:
'Biggest ransomware outbreak in history' hits nearly 100 countries. (2017). ABC News.
Retrieved 14 September 2017, from http://www.abc.net.au/news/2017-05-13/biggest-
ransomware-outbreak-in-history-hits-nearly-100-nations/8523102
Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network
Security, 2016(9), 5-9.
Chen, J. S., & Tsou, H. T. (2012). Performance effects of IT capability, service process
innovation, and the mediating role of customer service. Journal of Engineering and
Technology Management, 29(1), 71-94.
Courier Software & Delivery Dispatch - OnTime 360. (2017). Ontime360.com. Retrieved 14
September 2017, from https://www.ontime360.com/
Pathak, D. P., & Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing
challenge. International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume, 5.
Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and
recovering from ransomware attacks. Applied clinical informatics, 7(2), 624.
Teixeira, J., Patrício, L., Nunes, N. J., Nóbrega, L., Fisk, R. P., & Constantine, L. (2012).
Customer experience modeling: from customer experience to service design. Journal of
Service Management, 23(3), 362-376.
Zurich, L. B. (2017). Service Operations and Management.
References:
'Biggest ransomware outbreak in history' hits nearly 100 countries. (2017). ABC News.
Retrieved 14 September 2017, from http://www.abc.net.au/news/2017-05-13/biggest-
ransomware-outbreak-in-history-hits-nearly-100-nations/8523102
Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network
Security, 2016(9), 5-9.
Chen, J. S., & Tsou, H. T. (2012). Performance effects of IT capability, service process
innovation, and the mediating role of customer service. Journal of Engineering and
Technology Management, 29(1), 71-94.
Courier Software & Delivery Dispatch - OnTime 360. (2017). Ontime360.com. Retrieved 14
September 2017, from https://www.ontime360.com/
Pathak, D. P., & Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing
challenge. International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume, 5.
Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and
recovering from ransomware attacks. Applied clinical informatics, 7(2), 624.
Teixeira, J., Patrício, L., Nunes, N. J., Nóbrega, L., Fisk, R. P., & Constantine, L. (2012).
Customer experience modeling: from customer experience to service design. Journal of
Service Management, 23(3), 362-376.
Zurich, L. B. (2017). Service Operations and Management.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





