Category Archives: ACC 564

STRAYER ACC 564 Entire Course latest

STRAYER ACC 564 Entire Course latest

Check this A+ tutorial guideline at

http://www.assignmentclick.com/acc-564-strayer/acc-564-entire-course-latest

For more classes visit

www.assignmentclick.com

Please check the details below

 

ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS

 

ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller

 

ACC 564 Week 2 Assignment 1 Information Needs for the AIS (2 Papers)

 

ACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the Sarbanes-Oxley Act (SOX)

 

ACC 564 Week 4 DQ 1 The Cloud Effect and DQ 2 Securing Data

 

ACC 564 Week 4 Assignment Hacking the AIS (2 Papers)

 

ACC 564 Week 5 DQ 1 Integrity vs. Availability and DQ 2 The 21st Century Auditor

 

ACC 564 Week 6 DQ 1 Revenue Cycle and DQ 2 Expenditure Cycle

 

ACC 564 Week 7 DQ 1 Professional Service Organizations and DQ 2 General Ledger and Reporting Systems

 

ACC 564 Week 7 Assignment 3 Fraud in the AIS (2 Papers)

 

ACC 564 Week 8 DQ 1 Relational Databases and DQ 2 The REA Data Model

 

ACC 564 Week 9 DQ 1 Systems Analysis and DQ 2 AIS

 

ACC 564 Week 10 DQ 1 Implementation and DQ 2 Operation

 

ACC 564 Week 10 Assignment 4 Changing the AIS (2 Papers)

 

ACC 564 Week 11 DQ 1 Looking Back and DQ 2 Looking Ahead

 

ACC 564 Week 3 Quiz 1

 

ACC 564 Week 5 Quiz 2

 

ACC 564 Week 8 Quiz 3

 

ACC 564 Week 9 Quiz 4

 

ACC 564 Final Exam Part 1

 

ACC 564 Final Exam Part 2

 

STRAYER ACC 564 Final Exam Part 1 latest

STRAYER ACC 564 Final Exam Part 1 latest

Check this A+ tutorial guideline at

http://www.assignmentclick.com/acc-564-strayer/acc-564-final-exam-part-1-latest

For more classes visit

www.assignmentclick.com

Course Accounting Info Systems

 

Question 1 .

 

An accounting information system (AIS) processes ________ to provide users with ________.

 

. Question 2 .

 

Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key decisions in what business process?

 

. Question 3 .

 

Which of the following is a primary activity in the value chain?

 

. Question 4 .

 

A change in the AIS that makes information more easily accessible and widely available within an organization is most likely to first influence the

 

. Question 5 .

 

A frantic StroFrinzel called the home office from Des Moines. “You have got to help me. I am about to close a great sale, but I have to be able to guarantee delivery by the fourteenth. I can’t get through to the company Web site to verify delivery!” “Thank you for calling. Your call is very important to us. However, all of our lines are currently in use. Please try again later.” Which of the following characteristics of useful information is absent in the situation described above?

 

. Question 6 .

 

The coding technique most likely used for sales orders is called a

 

. Question 7 .

 

The quality assurance department at a large manufacturing business enters data into the AIS that is used to produce a weekly report that summarizes the proportion of defective units in each product line. This is an example of

 

. Question 8 .

 

A specialized journal

 

. Question 9 .

 

Data must be collected about three facets of each business activity. What are they?

. Question 10 .

 

A specialized journal would be most likely to be used to enter

 

. Question 11 .

 

The Union Soup Kitchen is a non-profit organization that collects, stores, prepares and provides food to the homeless in Erie, Pennsylvania. Donations of food are recorded in a database and a receipt is provided to the donor. When food is used, the database is latest so that it always reflects the amounts and types of food that are available. In a data flow diagram, which type of symbol would be used to represent the flow of data from the donor into the system?

 

. Question 12 .

 

A flowchart that depicts the relationships among the input, processing, and output of an AIS is

 

. Question 13 .

 

In a data flow diagram of the customer payment process, “Customer payment” will appear above or in

 

. Question 14 .

 

In general, a data destination will be shown by

 

. Question 15 .

 

In preparing a DFD, when data are transformed through a process, the symbol used should be

 

. Question 16 .

 

When the human resources manager wants to gather data about vacation and personal day usage by employees and by departments, the manager would use which language?

 

. Question 17 .

 

The potential inconsistency that could occur when there are multiple occurrences of a specific data item in a database is called the

 

. Question 18 .

 

The schema that provides an organization-wide view of the entire database is known as the

 

. Question 19 .

 

The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the

 

. Question 20 .

 

In a relational database, requiring that every record in a table have a unique identifier is called the

 

. Question 21 .

 

Which of the following is an opportunity that could contribute to employee fraud?

 

. Question 22 .

 

Which of the following is the greatest risk to information systems and causes the greatest dollar losses?

 

. Question 23 .

 

One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as

 

. Question 24 .

 

Most frauds are detected by

 

. Question 25 .

 

The most efficient way to conceal asset misappropriation is to

 

. Question 26 .

 

A fraud technique that slices off tiny amounts from many projects is called the ________ technique.

 

. Question 27 .

 

Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using

 

. Question 28 .

 

A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called

 

. Question 29 .

 

Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called

 

. Question 30 .

 

A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.

 

. Question 31 .

 

________ controls prevent, detect and correct transaction errors and fraud.

 

. Question 32 .

 

According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports.

 

. Question 33 .

 

Generally in a risk assessment process, the first step is to

 

. Question 34 .

 

The process that a business uses to safeguard assets, provide accurate and reliable information, and promote and improve operational efficiency is known as

 

. Question 35 .

 

According to the ERM, these help the company address all applicable laws and regulations.

 

. Question 36 .

 

Which of the following is an example of a corrective control?

 

. Question 37 .

 

The process of turning off unnecessary features in the system is known as

 

. Question 38 .

 

The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as

 

. Question 39 .

 

According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that

 

. Question 40 .

 

Compatibility tests utilize a(n) ________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate.

 

. Question 41 .

 

Which of the following is not one of the three important factors determining the strength of any encryption system?

 

. Question 42 .

 

Which of the following descriptions is not associated with symmetric encryption?

 

. Question 43 .

 

An electronic document that certifies the identity of the owner of a particular public key.

 

. Question 44 .

 

Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers’ personal information?

 

. Question 45 .

 

These are used to create digital signatures.

 

. Question 46 .

 

This determines the correctness of the logical relationship between two data items.

 

. Question 47 .

 

This determines if characters are of the proper type.

 

. Question 48 .

 

Check digit verification is an example of a(n)

 

. Question 49 .

 

This batch processing data entry control sums a non-financial numeric field.

 

. Question 50 .

 

What is the most effective way to ensure information system availability?

 

STRAYER ACC 564 Final Exam Part 2 latest​

STRAYER ACC 564 Final Exam Part 2 latest​

Check this A+ tutorial guideline at

http://www.assignmentclick.com/acc-564-strayer/acc-564-final-exam-part-2-latest

For more classes visit

www.assignmentclick.com

ACC 564 Final Exam Part 2

Question 1

 

In the ________ stage of an operational audit, the auditor measures the actual system against an ideal standard.

 

Question 2

 

An auditor finds that employee absentee rates are significantly higher on Mondays and Fridays than on other work days. This is an example collecting audit evidence by

 

Question 3

 

The ________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures.

 

Question 4

 

According to the risk-based auditing approach, when a control deficiency is identified, the auditor should inquire about

 

Question 5

 

Control risk is defined as the

 

Question 6

 

During the sales order entry process, a ________ is performed to verify that each transaction record contains all appropriate data items.

 

Question 7

 

The shipping department at Squishy Things Toy Company follows policies that determine which carrier will deliver orders according to the size, weight, and destination of the shipment. It maintains standing agreements with shippers that specify legal responsibility for the shipment while it is in transit. The terms of the agreements are documented on

 

Question 8

 

When an ERP is used, it is assumed that there will be increases in efficiency and the effectiveness of the activities related to the revenue cycle. However, what must be in place and functioning well to fully realize these benefits?

 

Question 9

 

Which of the following documents would normally trigger the process to record a customer payment?

 

Question 10

 

A type of business document in which part of the original document is returned to the source for further processing is called a ________ document.

 

Question 11

 

Duties in the expenditure cycle should be properly segregated to promote internal control. This means that the authorization function is performed by ________, the recording function is performed by ________, and cash handling is performed by the ________.

 

Question 12

 

Procurement cards differ from corporate credit cards in which of the following ways?

 

Question 13

 

What control should be put in place that assigns responsibility for EFT payments made to vendors?

 

Question 14

 

Economic Order Quantity (EOQ) includes several variables that must be taken into consideration when calculating the optimal order size. One variable, the costs associated with holding inventory, is referred to as

 

Question 15

 

The traditional approach to inventory management to ensure sufficient quantity on hand to maintain production is known as

 

Question 16

 

When using electronic documents, ________ increase the accuracy of data entry.

 

Question 17

 

Which department should have the sole ability to provide information to the AIS about hiring, terminations, and pay rate changes?

 

Question 18

 

The document that lists each employee’s gross pay, payroll deductions, and net pay in a multicolumn format is called

 

Question 19

 

Companies that specialize in processing payroll are known as

 

Question 20

 

Which of the following will limit a firm’s potential loss exposure from paycheck forgery?

 

Question 21

 

Recording interest earned on an investment is an example of which type of adjusting journal entry?

 

Question 22

 

Departments that mostly provide services to other units and charge those units for services rendered should be evaluated as ________ centers.

 

Question 23

 

Cheryl Liao is an accountant at Folding Squid Technologies. While making an adjusting entry to the general ledger, she received the following error message, “Your journal entry must be a numeric value. Please reenter.” This message was the result of a

 

Question 24

 

Budgets and performance reports should be developed on the basis of

 

Question 25

 

An adjusting entry made at the end of an accounting period that reflects the exchange of cash prior to performance of a related event is classified as a(n)

 

Question 26

 

Each event in an REA model will in most cases have at least one ________ agent and one ________ agent involved with the event.

 

Question 27

 

The REA data model

 

Question 28

 

Which of the following transactions is represented by the diagram below?

 

Question 29

 

An entity-relationship (E-R) diagram

 

Question 30

 

Relationships that affect the quantity of a resource are sometimes referred to as ________ relationships.

 

Question 31

 

Refer to the table below, which shows the results of payback, net present value, and internal rate of return analysis of four projects. Which is preferred by the net present value criterion?

 

Question 32

 

When using the payback method to determine economic feasibility of projects, the company usually accepts the project with the

 

Question 33

 

Who is responsible for preparing the specifications that are used to create the programs?

 

Question 34

 

Refer to the table below, which shows the results of payback, net present value, and internal rate of return analysis of four projects. Which is preferred by the payback criterion?

 

Question 35

 

The capital budgeting technique where estimated future cash flows are discounted back to the present is referred to as

 

Question 36

 

When canned software is used for systems acquisition, the maintenance aspect of the operations and maintenance phase of the SDLC

 

Question 37

 

BenathirDonathat, director of the project committee, has received approval from management for implementation of a latest accounting information system. After putting out an RFP, the committee settled on a vendor that will provide an industry standard software package and post-sale technical support. The committee decided to go with

 

Question 38

 

The ________ method calculates and compares the processing times of different AIS to compare system performance.

 

Question 39

 

End-user computing is likely to result in a(n)

 

Question 40

 

What would be one duty of second-line help desk personnel?

 

Question 41

 

One process used to uncover and eliminate program errors is known as

 

Question 42

 

Who is responsible for identifying such risk factors in an implementation plan?

 

Question 43

 

Which of the following describes a phase-in conversion?

 

Question 44

 

Phil in Marketing got a call from Chuck in ITS. “Phil, the system just generated a stock-out report. I wanted to give you a heads up. I’m sending it right over.” This is an example of a

 

Question 45

 

Chuck in ITS got a call from Phil in Marketing. “Chuck, I need you to do something for me. Query sales data for the first quarter and pull out all of the invoices that include the snow blower discount. I need a count and the total amount of the discount. Thanks.” This is an example of a

 

STRAYER ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS latest

STRAYER ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS latest

Check this A+ tutorial guideline at

http://www.assignmentclick.com/acc-564-strayer/acc-564-week-1-dq-1-value-of-information-and-dq-2-ais-latest

For more classes visit

www.assignmentclick.com

ACC 564 Week 1 Discussion Questions

Week 1 Discussion 1

“Value of Information”  Please respond to the following:

Firms realize that in order to make money, they have to invest money. This can be attributed to the information that the firm relies on. As discussed in the text, there are seven characteristics of useful information. From the first e-Activity and assuming that you are  CFO of  University, identify the top-three characteristics you would rely on the most for improving the profitability of the firm. Provide an example of how each characteristic would directly help the firm in terms of profitability.

On the other hand, public and private firms are accountable to a wide range of regulators and stakeholders. Of the seven characteristics, identify the top three that would be applicable to meeting the needs of regulators and stakeholders. Provide an example of how each characteristic would directly help the firm in terms of meeting the needs of these key regulators and stakeholders.

 

Week 1 Discussion 2

“Impact of Design of an Accounting Information System (AIS)”  Please respond to the following:

Some of the world’s most successful companies (Fortune 500) operate multiple lines of business. Despite this fact, many of these firms rely on a single AIS. From the second e-Activity, for the business you researched, examine how its lines of business would affect the design of a  AIS.

If the business was selecting a  AIS, examine how the business model would affect the design of a  AIS.

 

STRAYER ACC 564 Week 2 Assignment 1 Information Needs for the AIS (2 Papers) latest

STRAYER ACC 564 Week 2 Assignment 1 Information Needs for the AIS (2 Papers) latest

Check this A+ tutorial guideline at

http://www.assignmentclick.com/acc-564-strayer/acc-564-week-2-assignment-1-information-needs-for-the-ais-latest

For more classes visit

www.assignmentclick.com

This Tutorial contains 2 Different Papers

ACC 564 Week 2 Assignment 1 -

Assignment 1: Information Needs for the AIS
In 1967, Russell Ackoff presented a classical analysis of misinformation in management (Ackoff’s Management Misinformation Systems, Case 1-2, located in your Blackboard course shell). Now, you need to fast-forward to the present. After reading the case, craft your own version of misinformation in management by developing five (5) key incorrect assumptions that management makes about its accounting information systems.

For this assignment, research the Internet or  databases for information related to improper assumptions concerning accounting information systems.

 

Write a five to seven (5-7) page paper in which you:

Based on your research, assess how corporate leaders may make improper assumptions related to accounting information systems and the related information. Indicate the most negative potential impacts on business operations related to these assumptions. Provide support for your rationale.
Suggest three to four (3-4) ways in which organizational performance may be improved when information is properly managed within a business system. Provide support for your rationale.
Evaluate the level of system security (i.e., high, medium, low) needed to ensure information integrity within automated business systems. Provide support for your evaluation.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times  Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Examine and use data flow diagrams and flowcharts to understand, evaluate, and design information systems.
Evaluate the approaches and techniques that are used to commit and prevent computer fraud.
Use technology and information resources to research issues in accounting information systems.
Write clearly and concisely about accounting information systems using proper writing mechanics.

 

STRAYER ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller latest

STRAYER ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller latest

Check this A+ tutorial guideline at

http://www.assignmentclick.com/acc-564-strayer/acc-564-week-2-dq-1-evaluation-of-documentation-tools-and-dq-2-david-miller-latest

For more classes visit

www.assignmentclick.com

ACC 564 Week 2 Discussion Questions –

Week 2 Discussion 1

“Evaluation of Documentation Tools”  Please respond to the following:

You have been assigned to analyze the accounting information for a Fortune 500 corporation. From the e-Activity, evaluate which tools you would use to analyze its business processes, indicating your rationale.

On the other hand, resources, such as accountants, business analysts, and I/T specialists who rely on documentation tools, will need proper training on these tools. You have been given the responsibility of familiarizing your team with these tools. Evaluate which techniques, in terms of their appropriateness, you would use to get your team ready for its first assignment—the evaluation of a firm’s internal control structure.

 

Week 2 Discussion 2

 

“David Miller”  Please respond to the following:

Read the David Miller case from Chapter 5. After reading the case, describe a reason why someone who has been entrusted with the firm’s assets would commit a fraudulent act against the company. Based upon your understanding of the case and your professional and personal experience, recommend a series of actions that should have been taken in order to prevent this.

Now that the damage has been done by Mr. Miller after his last episode, the blame game begins. Review all of the parties who contributed to his ability to commit these acts, recommend who should be held liable, and suggest the punishment for the liable party / parties.

 

STRAYER ACC 564 Week 3 Quiz 1 latest

STRAYER ACC 564 Week 3 Quiz 1 latest

Check this A+ tutorial guideline at

http://www.assignmentclick.com/acc-564-strayer/acc-564-week-3-quiz-1-latest

For more classes visit

www.assignmentclick.com

Question 1

 

A well-designed AIS can improve the decision-making function within the organization. Which statement below would describe a limitation, rather than a benefit, of an efficient AIS?

 

Question 2

 

The transaction cycle that includes the events of hiring employees and paying them is known as the

 

Question 3

 

Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key decisions in what business process?

 

Question 4

 

Which of the following is a primary activity in the value chain?

 

 

Question 5

 

The business owners obtain financing from outside investors, which results in an inflow of cash into the company. This transaction is considered to be part of which cycle?

 

Question 6

 

Changing an employee’s hourly wage rate would be recorded in which file?

 

Question 7

 

When the sum of all entries in the subsidiary ledger equals the balance in the corresponding general ledger account, it is assumed that

 

Question 8

Which of the following is conceptually similar to a journal in a manual AIS?

 

Question 9

 

In an ERP system, the module used to record data about transactions in the revenue cycle is called

 

 

 

Question 10

 

An audit trail

 

Question 11

 

In general, a data destination will be shown by

 

Question 12

 

Chas Mulligan has been hired by Yardley Security as an assistant to the internal auditor. He has been asked to thoroughly document the existing accounting information system in preparation for making recommendations for improvements to internal controls. He decides to begin with a description of the information stored in paper records, their sources, and their destinations. The documentation tool that he should employ for this purpose is a

 

Question 13

 

In a payroll processing DFD, the “prepare reports” activity will be represented by ________, the “employee payroll file” will be represented by ________, and the “management” will be represented by ________.

 

Question 14

 

The correct label for Shape 2 in the flowchart below is

 

 

Question 15

 

Chuck and Jill Scruggs travel in their motor home six months of the year and buy unique artifacts. Within hours after the Scruggs make a purchase, they have photographed it, written a description of it, and posted it for sale on eBay with a reservation price. Anything that does not sell within a week is shipped back to Austin, Texas, for display in The House of Curiosities, a retail business that the Scruggs operate during the balance of the year. Which symbol should be used to represent the transfer of data to eBay in a context diagram of this process?

 

Question 16

 

Most frauds are detected by

 

Question 17

 

Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization?

 

Question 18

 

Why is computer fraud often more difficult to detect than other types of fraud?

 

Question 19

 

Which of the following is a financial pressure that could cause an employee to commit fraud?

 

Question 20

 

One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as

 

STRAYER SACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the Sarbanes-Oxley Act (SOX) latest

STRAYER SACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the Sarbanes-Oxley Act (SOX) latest

Check this A+ tutorial guideline at

http://www.assignmentclick.com/acc-564-strayer/acc-564-week-3-dq-1-attacks-and-dq-2-revamping-the-sarbanes-oxley-act-latest

For more classes visit

www.assignmentclick.com

ACC 564 Week 3 Discussion Questions –

Week 3 Discussion 1

“Attacks”  Please respond to the following:

You have been hired by the CFO of  University to develop a plan to protect its accounting and financial systems at a reasonable cost. Suggest a high-level plan for the CFO. Provide support for your suggestion.

Based on your security plan recommendation, determine the system aspect that is most likely to be violated.

 

Week 3 Discussion 2

 

“Revamping the Sarbanes-Oxley Act (SOX)”  Please respond to the following:

We know that the Sarbanes-Oxley Act was created as the result of several high-profile fraud cases. Now that the act is over 10 years old, many think that it needs to be latest to reflect the changing times. From the e-Activity, identify and discuss at least three changes that should be made to the act, indicating why these changes are necessary.

Create an argument supporting three items in the act that you would not change.

 

STRAYER ACC 564 Week 4 Assignment Hacking the AIS (2 Papers) latest

STRAYER ACC 564 Week 4 Assignment Hacking the AIS (2 Papers) latest

Check this A+ tutorial guideline at

http://www.assignmentclick.com/acc-564-strayer/acc-564-week-4-assignment-hacking-the-ais–latest

For more classes visit

www.assignmentclick.com

This Tutorial contains 2 Different Papers

ACC 564 Week 4 Assignment 2 -

Assignment 2: Hacking the AIS

Due Week 4 and worth 240 points

In today’s technology environment, hackers present a substantial risk to a firm’s accounting or business system. As the result of these attacks, firms suffer huge losses, ranging from financial losses to losses in confidence by consumers, creditors, and suppliers. Firms may have made a significant investment in financial and non-financial resources to secure these systems.

 

For this assignment, research the Internet or  databases for information related to business systems that have been hacked.

 

Write a five to seven (5-7) page paper in which you:

Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
Imagine that the company that you researched uses a third-party accounting system. Assess the level of responsibility of the software provider to both the business and its clients. Provide support for your rationale.
Create an argument for additional regulation as a preventative measure against businesses being hacked. Provide support for your argument.
Provide at least three (3) recommendations for businesses to secure their systems and assets from hackers. Provide support for your recommendation.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times  Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Examine control and security concepts related to accounting information systems to ensure data integrity and safety.
Use technology and information resources to research issues in accounting information systems.
Write clearly and concisely about accounting information systems using proper writing mechanics.

 

STRAYER ACC 564 Week 4 DQ 1 The Cloud Effect and DQ 2 Securing Data latest

STRAYER ACC 564 Week 4 DQ 1 The Cloud Effect and DQ 2 Securing Data latest

Check this A+ tutorial guideline at

http://www.assignmentclick.com/acc-564-strayer/acc-564-week-4-dq-1-the-cloud-effect-and-dq-2-securing-data-latest

For more classes visit

www.assignmentclick.com

ACC 564 Week 4 Discussion Questions –

Week 4 Discussion 1

“The Cloud Effect”  Please respond to the following:

Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire of being a dominant player in the global market.

As the CFO, describe your top-three fears in competing in the global market, and how you plan to overcome those fears. Provide support for your rationale.

 

Week 4 Discussion 2

“Securing Data”  Please respond to the following:

In this global age of information, suggest which threats are posed to the principles of confidentiality and privacy, related to offshore outsourcing of various information systems functions. Provide support for your rationale.

Determine who should be held liable for any breaches that occur, and indicate the course(s) of action that should be taken.