Finance and Accounting Application That Provides Finance Research Paper

Total Length: 953 words ( 3 double-spaced pages)

Total Sources: 3

Page 1 of 3

Finance and Accounting Application that provides finance and accounting operations require all the possible computer security measures to be adopted. In this case, two patterns call for an incident response plan:

The company's computer networks and systems are at a higher risk to threats like intrusions, computer viruses and exposures

Computers are widespread through the company; the company depends heavily on computers and cannot afford service denial

Therefore, the following security incidents will be an essential:

A computer virus might be copied to a LAN server; within seconds, thousands of other computers will be infected. This will require the efforts of different people and several days to achieve recovery.

Back-ups can be infected with viruses resulting in re-infection of other systems; recovery will require more expenses and time

System intruders could copy passwords and distribute them across large networks

Outbreaks of system or virus penetrations will cause embarrassment and possible loss of public confidence (Taylor, 2013).

These incidents can cause the company to confront unwanted expenses in productivity, damage to their reputation and significant damage to systems. Clearly, there is a pressing need to take action before suffering the impacts of a massive computer security problem. This necessitates the incident response plan to draw needed resources together in an organized manner to handle any adverse events related to the security and safety of the companies, and its clients.

Stuck Writing Your "Finance and Accounting Application That Provides Finance" Research Paper?

The adverse events could be unauthorized access to the company's systems, a malicious code attack, hoaxes and denial of service attacks (Vacca & Rudolph, 2010).

Responding to an incident

In this case, there are six stages of response:

Preparation - An incident response team must know how to respond to an incident before it happens as this could save valuable effort and time

Identification -- it is important to identify whether the incident has occurred or not. In case it has occurred, then the response team must take appropriate actions

Containment -- it entails limiting the magnitude and scope of the incident. Because so many incidents involve malicious codes, they can spread rapidly. This could precipitate enormous loss and destruction of information. As soon as the response team recognizes an incident, it must immediately begin to work on containment (Vacca & Rudolph, 2010).

Eradication -- one of the most difficult processes is the removal of the cause of the incident. It involves conviction of perpetrators, virus removal, and dismissing employees

Recovery - it is essential to restore a system to its normal business operations. After the restoration, it will be important to verify that the restored operations are successful and the system is functioning as expected.

Follow-up -- some incidents demand substantial effort and time. After terminating….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Finance And Accounting Application That Provides Finance" (2013, November 12) Retrieved June 27, 2025, from
https://www.aceyourpaper.com/essays/finance-accounting-application-provides-126993

Latest MLA Format (8th edition)

Copy Reference
"Finance And Accounting Application That Provides Finance" 12 November 2013. Web.27 June. 2025. <
https://www.aceyourpaper.com/essays/finance-accounting-application-provides-126993>

Latest Chicago Format (16th edition)

Copy Reference
"Finance And Accounting Application That Provides Finance", 12 November 2013, Accessed.27 June. 2025,
https://www.aceyourpaper.com/essays/finance-accounting-application-provides-126993