Friday 1 June 2012

:: Article Review - Accounting Information Systems Threats ::

Threats to Accounting Information Systems


Threats to accounting information systems can come from a variety of sources. If these threats are ignored, they can destroy the relevance and reliability of financial information, leading to poor decisions by various stakeholders.

At the point where data is collected, it is very important to establish security controls that ensure that transaction or event data are valid, complete, and free from material errors. Hacker activities that can occur at the data collection level include pretending to be an authorized user (masquerading) and tapping into telecommunications lines (piggybacking).
Threats to accounting information systems can also occur during the data processing phase. This can include creating illegal programs, accessing or deleting files, destroying or corrupting a program’s logic through viruses, or altering a program’s logic to cause the application to process data incorrectly all represent threats.

Threats to database management might also include unauthorized access that allows altering, deleting, corrupting, destroying, or stealing data. The failure to maintain backup files or other retrieval techniques represents a potentially devastating loss of data. Threats to the information generation and reporting phase must also be considered. For example, the theft, misdirection, or misuse of computer output could damage the competitiveness or reputation of the company.

Advances in information technology and increased use of the Internet require that management, accountants, auditors, and professors become more knowledgeable and conversant in the design, operation, and control of accounting information systems.

In my opinion…..

A threat to an information resource is any danger to which a system may be exposed. The exposure of an information resources is the harm, loss or damage that can result if a threat compromise that resources. In order to make sure that the information system are free from any threat, it will depend on how a person use it or protect it. If not, it will be very dangerous to the users itself. In other words, they must take a preventive action before the threat occur.

It is goods for the user to have security control that ensure the transaction are safe from any threat. Besides that, the user can ensure that any processing data are free from harm and make a backup file for each of the information. By taking these step, it will help the users to face more serious threat to their information system rather than not take any action and just let it occurs.

credit to;

0 comments:

Post a Comment