This website uses cookies to ensure you have the best experience. Learn more

Cybersecurity Essay

910 words - 4 pages


1. What section of the SOX compliance law requires proper controls and hence, security controls, to ensure the confidentiality and integrity of financial information and recordkeeping within an IT infrastructure? Explain the information contained in this section.
a. Sections 302 and 404 of the SOX compliance law cover the internal security controls to ensure the confidentiality and integrity of financial information and recordkeeping within an IT infrastructure. Section 302 requires the CEO and CFO to certify the truthfulness and accuracy of financial reports, while section 404 requires the company to provide proof (Weiss & Solomon, 2011).
2. Who is Richard Scrushy and why is he ...view middle of the document...

A large accelerated filer is an Exchange Act reporting company with a worldwide market value of outstanding voting and non-voting common equity held by non-affiliates of $700 million or more (Securities and Exchange Commision). These ‘large accelerated filers have a 75-day deadline for their 10-K forms (annually) and a 40-day deadline for their 10-Q forms (quarterly).
6. Where would someone go in order to find the quarterly and annual reports for a publicly traded company?
a. You would get the reports from the Securities and Exchange Commission
7. Go into the Edgar Database and find the most recent 10K or 10Q for Microsoft, Nike, and Cisco. Who signed off on the 10K for each of those companies?
a. Donald Blair and Frank Brod signed off on the companies stated.
8. What are some of the criminal penalties for falsifying documents, or covers up information related to financial matters and SOX?
a. One criminal penalty for falsifying documents is 1-20 years of imprisonment
9. What is the Japanese version of SOX, and what agency oversees its implementation?
a. J-SOX is the Japanese version of SOX, overseen by the Japanese financial service agency
10. Of what was Dennis Kozlowski convicted, and how is it related to SOX?
a. Dennis Kozlowski was convicted of grand larceny, loans involved were outlawed by SOX
11. What is the link between SOX compliance law and information systems security?
a. The link between SOX compliance law and information systems security is Section 404. Section 404 of the Sarbanes-Oxley Act mandates that all publicly-traded organizations demonstrate due diligence in the disclosure of financial information. They must also implement internal controls and procedures to communicate, store and protect that data. They must protect these controls from...

Other Papers Like Cybersecurity

Cyber Threats in the Dot, Doj, and Usda

4325 words - 18 pages ............................................................................................................................... - 2 Department of Transportation ................................................................................................ - 2 Mission & Background ............................................................................................................... - 2 Analysis of the Most Critical Threats in the DOT ...................................................................... - 3 Cybersecurity Policy Framework

Cyber Terrorism: The American Response Essay

1741 words - 7 pages identity fraud. This cyber terrorist attack was the catalyst for two important responses from the U.S. government. Firstly, on April 1st, 2015 President Obama announced The Cybersecurity Executive Order. It allows the U.S. government to hit back at hackers for the first time. The order will seek to identify and punish individuals behind attacks in the form of sanctions. Secondly, on April 22, 2015 the House of Representatives passed the Protecting

Telecomunication Ifsm 310 Project 2

996 words - 4 pages Table Contents Executive Summary 3 Proposed Technology Solution 3 Proposed Process and Policies 4 Business and Managerial Impacts and Risks 5 Cybersecurity Risks and Challenges 5 Cybersecurity Risks and Challenges 5 References 7 Executive Summary Ullman, Manly, & Ulysses Corporation (UMUC) is a worldwide supplier with a total of 75,000 employees. One-third of company’s personnel working in several locations in the United

Trend Analysis Of Wechat Payment Function

674 words - 3 pages : wechat I am an IT specialist working in Tencent who are going to improve cybersecurity for their social networking platform in China. * Audience analysis: I am an IT specialist working in tencent who are going to improve cybersecurity for their social networking platform (wechat) in China. I need to report to the manager about the latest trend of development of cybersecurity so that to improve the functions and enhance user experiences

Critical Infrastructure Protection

1373 words - 6 pages Lieberman (I-Conn.) and reconsidered in December by the Senate Committee on Homeland Security and Governmental Affairs. It calls for the development of a National Center for Cybersecurity and Communications (NCCC) inside the U.s. Division of Homeland Security (DHS) that might be answerable for securing both elected workstation systems and discriminating framework possessed by the private part against digital ambushes. Vulnerabilities Spearphishing

Internet Governance

2134 words - 9 pages up to the internet entrepreneurs to develop a new internet that will go against the ITU restrictions however this could take years to develop. Even though the internet carries many advantages, there are also many disadvantages which include; privacy, security, freedom of expression and protection of intellectual properties, amongst many other disadvantages. (Griffin 2012) States that Cybersecurity is the biggest problem that most major

What Is Computer Security?

286 words - 2 pages Computer security (Also known as cybersecurity or IT Security) is information security as applied to computers and networks. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters. One way to think of computer security is to

Unit 5 Individual Project

1226 words - 5 pages assist the government in defending the homeland. There are two main programs that each play an extremely important role in the primary mission areas of Prevention and Response. The first is the National Cyber Security Alliance (NCSA). In 2014, the government passed the National Cybersecurity and Critical Infrastructure Protection Act, which promotes the notion that cybersecurity is an issue not just for the business community or the government, but

Data Breach Research Papaer

1475 words - 6 pages comprehensive cybersecurity plan. Prevention being solutions, policies and procedures need to be identified to risk of attacks, resolution is the plans and procedures that need to be in place to determine the resources that will be used to remedy a threat, and restitution a company's preparation needed to address the repercussions of a security threat with their employees and customers to ensure that any loss of trust or business is minimal and

Ameriquest Symposium Inspires Business Leaders to Embrace New Ways of Thinking

733 words - 3 pages innovation, technology, generational strengths, cybersecurity, and the economy. "This year's Symposium was transformational for attendees, as it brought together a powerful lineup of visionaries to challenge and explore the most pressing topics facing business today", said Kate Freer, AmeriQuest Business Services Vice President of Marketing. The Symposium, which took place in February at the Ritz-Carlton Orlando Grande Lakes, opened with a

Cotemporary Security Issues

714 words - 3 pages , J., &Padmanabhan, V. (2014, February 12). Why cybersecurity is a strategic     issue. Bain Brief. Retrieved February 19, 2014, from     http://www.bain.com/publications/articles/why-cybersecurity-is-a-strategic-    issue.aspx Cooney, M. (2014, February 5). US Secret Service: Stronger laws could help fight sophisticated     cybercrime. Network World. Retrieved February 19, 2014, from     http://www.networkworld.com/community/blog/us-secret-service-stronger-laws-    could-help-fight-sophisticated-cybercrime

Related Essays

The Risks Of Not Investing Into Cybersecurity

2023 words - 9 pages The Risks of NOT Investing into CyberSecurity In 2002, preparations were being made for me to transition from the Navy to civilian life. I wanted to start a career in the IT field, and, unfortunately, the Navy wasn’t capable of providing me that opportunity. At the time though, careers in the IT field were still uncommon and considered overhead to corporations. After realizing this, I had decided to stay in the Navy since I hadn’t

Private Sector Public Sector Cybersecurity Issues Essay

1682 words - 7 pages   Table of Contents Introduction 2 Meta-Data in the Retail Industry 2 Negative Aspects 3 What Should Lawmakers Do? 4 Goals of Lawmakers 5 Possible Outcomes of Cybersecurity Regulations 5 Conclusion 6 References 7   Introduction Meta-data can be described as ‘detailed data which describe other data to obtain a better understanding and achieve better quality of information’ (Beth Haugen, Herrin, Slivochka, McNeil Tolley, Warner

Cyber Attacks Essay

1160 words - 5 pages June 7, 2013 Table of Contents Abstract 2 NICE Strategic Plan 3 NICE Goal’s 3 Stockholders 4 NICE Outcome: 6 Professional Competency: 7 Conclusion: 7 References: 7 Abstract Cybersecurity has evolved with such

Apple Inc 2008 Essay

2182 words - 9 pages Research Brief Homeland Security A RAN D IN FRAST RUCT URE , SAFE T Y, AN D E N VIRON ME N T PROGRAM Cybersecurity Economic Issues Corporate Approaches and Challenges to Decisionmaking RAND RESEARCH AREAS THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND