Case Study on "Audit and Accountability Case"
Case Study 6 pages (1901 words) Sources: 6
[EXCERPT] . . . .
Web browsers: there is evidence for the need to use current web browsers. However, majority of enterprises are unable to shift from Microsoft Internet Explorer (IE) because they still use critical business legacy applications still compatible with the older browser. A worldwide survey conducted in 2010 shows that even Google and other leading corporations still use IE despite its long 'obsoleteness' (Davidson, 2009). Firms using the obsolete version lack modern phishing security and a host vulnerable software that facilitate the dropping of backdoors on their computer networks.Conclusion
Spear phishing is the most widely used approach in imitating attacks. This is because users are increasingly falling prey to spear phishing emails, leading significant damage to respective organizations. Email attachments used in spear phishing are not easy to identify from normal document attachments in the corporate world. This increases the chances of successful workstation infections. The availability of organizational information on the websites enables attackers to obtain relevant data on their targets; this makes their APT campaigns more effective (Davidson, 2009). Spear phishing aids APT attacks owing to the vast amounts of data available at the touch of a button. Business enterprises must strive to enhance their existing defense strategies and carefully consider the amount of information they should display on the internet.
It is evident that spear phishing attacks affect different business industries, making all sectors a potential target. A report by the Anti-Phishing Movement shows that regular phishing attacks have declined in the past years while spear ph
download full paper ⤓
References
Davidson, A. (2009). The law of electronic commerce. Port Melbourne, Vic: Cambridge University Press.
Goodin, D. (2012). RSA SecurID software token cloning: A new how-to. Ars Technica. Available from: http://arstechnica.com/security/2012/05/rsa-securid-software-token-cloning-attack/
Ismail, N., & Cieh, E.L.Y. (2013). Beyond data protection: Strategic case studies and practical guidance. Berlin: Springer.
Kelly, S. (2012). Homeland Security cites sharp rise in cyber attacks. CNN Report. Available from: http://www.cnn.com/2012/07/04/us/cyber-attacks/index.html
Lewis, J.A. (2012). Significant Cyber Events. CSIS Magazine. Available from: http://csis.org/publication/cyber-events-2006
Rao, H.R., Gupta, M., & Upadhyaya, S. (2007). Managing information assurance in financial services. Hershey,… READ MORE
Quoted Instructions for "Audit and Accountability Case" Assignment:
Please use below information to prepare a six-page case study that discusses how an audit and accountability *****intervention***** could have mitigated the subject organization's exposure. Include a timeline of events surrounding the incident and an attack tree or other diagram showing the flow of information.
Cyber security incidents continue to make headlines. By analyzing the events surrounding these incidents, it is possible to identify missed opportunities for using auditing and accountability as a mechanism for improved safeguarding of the systems that were ultimately compromised.
Review the cyber incidents outlined in the articles linked below. Select one of these incidents or another that you have read about or know about personally. Outline the chronology of the incident and diagram the flow of information (you may want to use an attack tree approach for your initial analysis). Based on the recommendations in the NIST, ISACA, and Microsoft documents, identify how the application of audit methodology and tools could have changed the situation for the better.
Goodin, Dan. RSA SecurID software token cloning: A new how-to. (May 20, 2012). Ars Technica. Available from: http://arstechnica.com/security/2012/05/rsa-securid-software-token-cloning-attack/
Kelly, Suzanne. Homeland Security cites sharp rise in cyber attacks (July 4, 2012). CNN Report. Available from: http://www.cnn.com/2012/07/04/us/cyber-attacks/index.html
Lewis, James Andrew. Significant Cyber Events (May 4, 2012). CSIS Magazine. Available from: http://csis.org/publication/cyber-events-2006
*****
How to Reference "Audit and Accountability Case" Case Study in a Bibliography
“Audit and Accountability Case.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/audit-accountability-case-study/1990343. Accessed 6 Jul 2024.
Related Papers:
Auditing in the Public Sector Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Auditing in the Public Sector
Good governance demand accountability and transparency in the management of public resources. The diverse nature and size of government expenditure make public sector auditing necessary… read more
Term Paper 8 pages (2594 words) Sources: 9 Style: MLA Topic: Accounting / Auditing
Auditing Standard Research Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Auditing Standard
Standard: AU Section 339 Auditing Documentation
Summary of the new standard (main issues addressed and/or new concepts).
In Section 339, it discusses the basic standards that all auditors… read more
Research Paper 2 pages (635 words) Sources: 1+ Topic: Accounting / Auditing
Audit Reports Involve Increased Communication. The System Research Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
audit reports involve increased communication. The system at which it offers information is too condensed and does not provide new insight into anything. In fact, their pass/fail system lacks adequate… read more
Research Paper 4 pages (1610 words) Sources: 3 Topic: Economics / Finance / Banking
Audit Feedback From the Rocks Hotel Case Study
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Audit of the Rocks Hotel
The Rocks Hotel has significant potential to be a world-class resort, yet must overcome significant process and system-related challenges from a Human Resource Management (HRM)… read more
Case Study 11 pages (4154 words) Sources: 15 Style: Harvard Topic: Management / Organizations
Implementation of Electronic Medical Records in Healthcare Case Study
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Electronic Medical Records in Healthcare
In the implementation of an electronic medical records system, a team must be designed and delegated with the task of guiding the implementation of the… read more
Case Study 17 pages (5687 words) Sources: 17 Topic: Healthcare / Health / Obamacare
Sat, Jul 6, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!