financial statements

DISCUSSION CASE financial statements

Craig Thorne works in a public accounting firm and hopes to eventually be a partner. The management of Allnet Company invites Thorne to prepare a bid to audit Allnet’s financial statements. In discussing the audit fee, Allnet’s management suggests a fee range in which the amount depends on the reported profit of Allnet. The higher its profit, the higher will be the audit fee paid to Thorne’s firm.

 

Question 1: Identify the parties potentially affected by this audit and the fee plan proposed.

Question 2: What are the ethical factors in this situation?

Question 3: Would you recommend that Thorne accept this audit fee arrangement? Why or why not?

Question 4: Describe some ethical considerations guiding your recommendation.

 

Required

a. Submit a substantive posting of at least 250 words that answers the questions above. This posting must be submitted by midnight Thursday.

b. Respond to at least (2) fellow students’ postings by midnight Sunday. These responses (of at least 125 words) should be substantive and should add to the discussion.

 

Grading Rubric

Substantively answered all questions in an original post of at least 250 words – 15 / 15

Substantively responded to two other students, each response a minimum of 125 words – 10 /10

Ethical Hacking

 

Ethical Hacking

Discussion

Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:  1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.

The initial post is due by Thursday 11:59 pm EST.

Assignment

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.A reference citation is also required for this assignment. You may just include a link to your article.

information 

Information Assurance

Discussion

Describe in your own words what a rootkit is.
An initial post must be between 250-300 words and is due by Thursday 11:59 pm EST.

 

Data Base Security

Data Base Security

Overview

Overview

The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard designed to increase controls on personal data and to reduce fraud,  for organizations that handle branded credit cards from the major card schemes

Required Videos

Required Videos

https://www.youtube.com/watch?v=b6xplJbic6s

https://www.youtube.com/watch?v=k6JhhL2Kfdw

https://www.campuscommerce.com/new-pci-security-standards/

https://www.youtube.com/watch?v=ubeiOkXbWr4

 

Week 11 Discussion

Week 11 Discussion

In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.

Write in essay format not in bulleted, numbered or other list format.

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

 

Computer Security

Computer Security

Overview

Overview

This week we review Security Policies

This week’s topics:

  • Review last week’s assignmentt
  • Defining User Policies
  • Defining System Admin Policies
  • Defining  Access Control
  • Standards and Procedures
  • Review this week’s lab discussion
  • Review about submitting the final project

Required Readings

Required Readings

Read Chapter 10 of the Easttom text, Security Policies

Primary topics:

 

https://www.youtube.com/watch?v=i-HIXgjWd-E

Week Eleven Assignment

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

Week Eleven Submit Final Project Topic

Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.

 

Note your safe assign score. Score should be less than 25

 

Here is a list of your upcoming project deliverables:

  • Week 11. Submit final project.
  • Week 12. Submit a brief abstract describing your final project.
  • Week 13. Submit final project materials.

 

Possible Computer Security Research Project Topics

Anonymous

Citizen Rights vs Security

Cloud Computing

Computer Forensics

Data Center Security

Disaster Recovery

Edward Snowden – Traitor or Hero

Encryption

Hardware and Software Security

I Love You virus

Keyloggers

Mobile Malware

Mobile Security

Pharming

Phishing

Presidential Election 2016

Quantum Computers – Impact on Encryption

Ransomware, malware, business security

Security and the Cloud

Smart Grid

SOFTWARE CRACKERS

Stuxnet Virus

Undersea Cable

United State Cyber Command

Web War I – Estonia Attack

White Hat Hacking

Wi-Fi Security: Wireless Network Encryption

Creating Exploits

Home Automation Security and Vulnerabilities

Car Hacking