Case Study on "Audit and Accountability Case"

Case Study 6 pages (1901 words) Sources: 6

[EXCERPT] . . . .

Web browsers: there is evidence for the need to use current web browsers. However, majority of enterprises are unable to shift from Microsoft Internet Explorer (IE) because they still use critical business legacy applications still compatible with the older browser. A worldwide survey conducted in 2010 shows that even Google and other leading corporations still use IE despite its long 'obsoleteness' (Davidson, 2009). Firms using the obsolete version lack modern phishing security and a host vulnerable software that facilitate the dropping of backdoors on their computer networks.

Conclusion

Spear phishing is the most widely used approach in imitating attacks. This is because users are increasingly falling prey to spear phishing emails, leading significant damage to respective organizations. Email attachments used in spear phishing are not easy to identify from normal document attachments in the corporate world. This increases the chances of successful workstation infections. The availability of organizational information on the websites enables attackers to obtain relevant data on their targets; this makes their APT campaigns more effective (Davidson, 2009). Spear phishing aids APT attacks owing to the vast amounts of data available at the touch of a button. Business enterprises must strive to enhance their existing defense strategies and carefully consider the amount of information they should display on the internet.

It is evident that spear phishing attacks affect different business industries, making all sectors a potential target. A report by the Anti-Phishing Movement shows that regular phishing attacks have declined in the past years while spear ph
Continue scrolling to

download full paper
ishing attacks continue to increase. Cyber crime has become prevalent because attackers have stopped attempts of gaining personal information from users. They are currently concentrating on deceiving unsuspecting users to download crime-ware. This enables them to retrieve and collect sensitive information including company trade secrets.

References

Davidson, A. (2009). The law of electronic commerce. Port Melbourne, Vic: Cambridge University Press.

Goodin, D. (2012). RSA SecurID software token cloning: A new how-to. Ars Technica. Available from: http://arstechnica.com/security/2012/05/rsa-securid-software-token-cloning-attack/

Ismail, N., & Cieh, E.L.Y. (2013). Beyond data protection: Strategic case studies and practical guidance. Berlin: Springer.

Kelly, S. (2012). Homeland Security cites sharp rise in cyber attacks. CNN Report. Available from: http://www.cnn.com/2012/07/04/us/cyber-attacks/index.html

Lewis, J.A. (2012). Significant Cyber Events. CSIS Magazine. Available from: http://csis.org/publication/cyber-events-2006

Rao, H.R., Gupta, M., & Upadhyaya, S. (2007). Managing information assurance in financial services. Hershey,… READ MORE

Quoted Instructions for "Audit and Accountability Case" Assignment:

Please use below information to prepare a six-page case study that discusses how an audit and accountability *****intervention***** could have mitigated the subject organization's exposure. Include a timeline of events surrounding the incident and an attack tree or other diagram showing the flow of information.

Cyber security incidents continue to make headlines. By analyzing the events surrounding these incidents, it is possible to identify missed opportunities for using auditing and accountability as a mechanism for improved safeguarding of the systems that were ultimately compromised.

Review the cyber incidents outlined in the articles linked below. Select one of these incidents or another that you have read about or know about personally. Outline the chronology of the incident and diagram the flow of information (you may want to use an attack tree approach for your initial analysis). Based on the recommendations in the NIST, ISACA, and Microsoft documents, identify how the application of audit methodology and tools could have changed the situation for the better.

Goodin, Dan. RSA SecurID software token cloning: A new how-to. (May 20, 2012). Ars Technica. Available from: http://arstechnica.com/security/2012/05/rsa-securid-software-token-cloning-attack/

Kelly, Suzanne. Homeland Security cites sharp rise in cyber attacks (July 4, 2012). CNN Report. Available from: http://www.cnn.com/2012/07/04/us/cyber-attacks/index.html

Lewis, James Andrew. Significant Cyber Events (May 4, 2012). CSIS Magazine. Available from: http://csis.org/publication/cyber-events-2006

*****

How to Reference "Audit and Accountability Case" Case Study in a Bibliography

Audit and Accountability Case.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/audit-accountability-case-study/1990343. Accessed 6 Jul 2024.

Audit and Accountability Case (2013). Retrieved from https://www.a1-termpaper.com/topics/essay/audit-accountability-case-study/1990343
A1-TermPaper.com. (2013). Audit and Accountability Case. [online] Available at: https://www.a1-termpaper.com/topics/essay/audit-accountability-case-study/1990343 [Accessed 6 Jul, 2024].
”Audit and Accountability Case” 2013. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/audit-accountability-case-study/1990343.
”Audit and Accountability Case” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/audit-accountability-case-study/1990343.
[1] ”Audit and Accountability Case”, A1-TermPaper.com, 2013. [Online]. Available: https://www.a1-termpaper.com/topics/essay/audit-accountability-case-study/1990343. [Accessed: 6-Jul-2024].
1. Audit and Accountability Case [Internet]. A1-TermPaper.com. 2013 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/audit-accountability-case-study/1990343
1. Audit and Accountability Case. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/audit-accountability-case-study/1990343. Published 2013. Accessed July 6, 2024.

Related Papers:

Auditing in the Public Sector Term Paper

Paper Icon

Auditing in the Public Sector

Good governance demand accountability and transparency in the management of public resources. The diverse nature and size of government expenditure make public sector auditing necessary… read more

Term Paper 8 pages (2594 words) Sources: 9 Style: MLA Topic: Accounting / Auditing


Auditing Standard Research Paper

Paper Icon

Auditing Standard

Standard: AU Section 339 Auditing Documentation

Summary of the new standard (main issues addressed and/or new concepts).

In Section 339, it discusses the basic standards that all auditors… read more

Research Paper 2 pages (635 words) Sources: 1+ Topic: Accounting / Auditing


Audit Reports Involve Increased Communication. The System Research Paper

Paper Icon

audit reports involve increased communication. The system at which it offers information is too condensed and does not provide new insight into anything. In fact, their pass/fail system lacks adequate… read more

Research Paper 4 pages (1610 words) Sources: 3 Topic: Economics / Finance / Banking


Audit Feedback From the Rocks Hotel Case Study

Paper Icon

Audit of the Rocks Hotel

The Rocks Hotel has significant potential to be a world-class resort, yet must overcome significant process and system-related challenges from a Human Resource Management (HRM)… read more

Case Study 11 pages (4154 words) Sources: 15 Style: Harvard Topic: Management / Organizations


Implementation of Electronic Medical Records in Healthcare Case Study

Paper Icon

Electronic Medical Records in Healthcare

In the implementation of an electronic medical records system, a team must be designed and delegated with the task of guiding the implementation of the… read more

Case Study 17 pages (5687 words) Sources: 17 Topic: Healthcare / Health / Obamacare


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!