Free Essay

Is4680

In:

Submitted By rudy79904
Words 408
Pages 2
IS4680
Assess the Impact of Sarbanes-Oxley (SOX) Compliance Law on Enron

1. SOX Section 404 mandates that all publicly-traded companies must establish internal controls and procedures for financial reporting and must document test and maintain those controls and procedures to ensure their effectiveness. The purpose of SOX is to reduce the possibilities of corporate fraud by increasing the stringency of procedures and requirements for financial reporting. 2. Richard Scrushy first CEO charged with violating the SOX Act. He was owner and founder of HealthSouth Corp. 3. Under the Sarbanes-Oxley Act, the CEO and CFO of publicly traded companies to certify the appropriateness of their financial statements and disclosures and to certify that they fairly present. 4. 10-K is a company’s annual report that is filed yearly & make public. 10-Q is the company’s quarterly report. Upper management of major companies is to submit these to the Securities Exchange Commissions. 5. A company that meets conditions of a million dollar amount has been subject to periodic reporting requirements pursuant to Exchange Act Sections for certain amount of time, has previously filed at least one annual report pursuant, and is not eligible to file “Small Business” forms. They have75 days after the end of their quarter they have to file their quarterly financial report. 6. A person would go to a company’s webpage to find quarterly and annual reports for publicly traded company. Each company should have an investor relations section. 7. Microsoft: Assistant Director, Nike: Assistant Director, and Cisco: Assistant Director. 8. Some of the criminal penalties for falsifying documents or cover ups information related to financial matters and SOX are imprisonment. Imprisonment varies on situation. 9. JSOX is the Japanese version of SOX. This is overseen by ULVAC Technologies. 10. Dennis Kozlowski was convicted for crimes related to authorized bonuses, purchase of art, and other high cost money involvement. It’s related to SOX because fraud for public companies. 11. The link between SOX compliance law and information systems security 12. Section 302 and 404 are needed for proper internal controls to be in compliant with SOX. 13. The need for strong internal controls is not limited to public companies, however. Effective internal controls provide all management teams with repeatable and reliable information tools that allow them to identify, manage, and mitigate risk on an ongoing basis 14. They would be considered insiders because of the information they have from internal resources. 15. True

Similar Documents

Premium Essay

Is4680 Lab 8

...Aaron Douglas 09428009 IS4680 Unit 1 Assignment 1: Compliance Laws I believe the correct law that will work for my organization is the HIPPA compliance law. This law stands for Health Insurance Portability and Accountability Act. This law fits for what our organization needs to give auditors the table they need. The HIPPA law will also provide employees and citizens to maintain and get health insurance coverage in the case of any serious health problems. Also it improves efficiency and effectiveness of the American health care system. It will combat waste, fraud, and abuse in both health insurance and the delivery of health care overall so everyone is treated fairly. The requirements that will help our organization are: * Title I; Health Care Access, Portability, and Renewability * Title II; Preventing Health Care Fraud and Abuse, Administrative, Simplification, and Medical Liability Reform. * Title III; Tax-Related Health Provisions * Title IV; Application and Enforcement of Group Health Plan Requirements * Title V; Revenue Offsets These requirements will give the auditors what they need to do so that way we can get our goals accomplished on our end. Title I offers protection of health insurance coverage without regard to pre-existing conditions to those who lose or change jobs, locations. Title II provides requirements for the privacy and security of health information from fraud and hackers. This is often referred to as...

Words: 270 - Pages: 2

Premium Essay

Is4680 Unit 4

...Purpose: The purpose of this document is to outline the potential risks to XYZ Health Care. The company has decided that the current plan is out of date and needs to be updated. This report will identify the possible threats and vulnerability. This will also include the identify tactical, strategy, analysis, and risk mitigation procedure. Risk Analysis: To establishes the value of the hardware and software that the IT department uses to conduct business. (Servers, routers, switches, and firewalls.) Identify Threats and Vulnerabilities to Assets: This section identifies hardware that is vulnerable to failure due to age or natural lifespan. The improper identification of this could lead to data loss or the inability to access assets. This will not allow the company to meet its responsibilities which can result in loss of profits and/or violating the SLA (Service Level Agreement). Next to hardware failure is software failure. Much like hardware failure, it cannot be completely mitigated as it will happen eventually. Like hardware failure as well, if a program cannot be accessed the data cannot be transferred, created, stored, or processed. This again leads to loss of work, which can result in loss of profits and/or violating the SLA (Service Level Agreement).With the above threats being listed, the threat of data loss is immense. Data loss is the loss of any data that could take a sizable time investment to recoup. This could be from a failure on the hardware or software...

Words: 629 - Pages: 3

Free Essay

Is4680 Lab 4

...1) The DoD Information Assurance Certification and Accreditation Process (DIACAP) is the United States Department of Defense (DoD) process to ensure that risk management is applied on Information Systems from an enterprise view. DIACAP is a DoD-wide standard set of activities, tasks and process for the certification and accreditation of a DoD information system that will maintain the Information Assurance posture throughout the system's life cycle. The Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP) is a process defined by the United States Department of Defense (DOD) for managing risk. DoD Instruction (DODI) 5200.40 establishes a standard DOD-wide process with a set of activities, general tasks and a management structure to certify and accredit an Automated Information System (AIS) that will maintain the Information Assurance (IA) posture of the Defense Information Infrastructure (DII) throughout the system's life cycle. DITSCAP applies to the acquisition, operation and sustainment of any DOD system that collects, stores, transmits, or processes unclassified or classified information since December 1997. 2) The Director of Central Intelligence Directive (DCID) 6/3 establishes the security policy and procedures for storing, processing, and communicating classified intelligence data in information systems. To achieve compliance with DCID 6/3, agencies must ensure that information is safeguarded at all times and that...

Words: 360 - Pages: 2

Premium Essay

Is4680 Lab 7 and Questions

...Executive Summary Healthcare organizations are under strict compliance to HIPPA privacy requirements which require that an organization have proper security controls for handling personal healthcare information (PHI) privacy data. This includes security controls for the IT infrastructure while handling PHI. Many networks ran by public and private organizations have experienced intrusions in recent years, and this cyber exploitation has resulted in an unprecedented loss in private data. The threats to our networks and systems exist across numerous components that include end user devices, servers, and infrastructure devices. This summary is to examine the threats to routers and other network infrastructure devices in a Lan-to-Wan domain while considering HIPAA rules and regulations. There are key points to understand when trying to establish network security, those basic points are; * Protect Confidentiality * Maintain Integrity * Ensure Availability It is also imperative to keep in mind that all networks need to be protected from threats and vulnerabilities for a business to achieve its fullest potential. The most common threats and vulnerabilities are some of the following; * End-user carelessness * Misconfigured hardware and/or software * Intentional end-user acts (i.e. A disgruntled employee) Now, to fully understand what HIPAA is. HIPAA is the acronym for the Health Insurance Portability and Accountability Act that was passed by Congress...

Words: 867 - Pages: 4

Free Essay

Is4680 Week 1 Lab

...Introduction The Department of Defense (DOD) has several departments within the agency that companies will need to work with in order to carry out the terms of their contracts. When considering technology specifically, the DOD has the following departments ready to assist companies: Information Assurance Support Environment, Defense Information Systems Agency, Defense Technology Security Administration, Defense Cyber Crime Center, Defense Technical Information Center, and possibly others that were not immediately obvious (U.S. Department of Defense, 2015). The Information Assurance Support Environment produces Security Technical Implementation Guides (STIGs) for various computer topics, which can be utilized by companies who wish to do business with the DOD. These guides serve as a baseline for the company in regards to the technology specifications they should have in place in order to lock down their systems and network to make them less vulnerable to malicious attacks (Defense Information Systems Agency, 2015). Among these STIGs is one written specifically for the Windows 8 / 8.1 operating system (Information Assurance Support Environment, 2015). This STIG outlines some of the changes made by Microsoft to Windows 8 / 8.1 as well as their recommendations for securing computers, which use that operating system. Tools Windows 8 / 8.1 comes with many tools built into it that allow for the administrator to use in order to do a security audit. A keyboard shortcut of pressing...

Words: 855 - Pages: 4

Free Essay

Is4680 Week 1 Lab Executive Summery

...Lab #2: Executive Summary Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server). Security Technical Implementation Guide is a Compendium of DOD Policies, Security Regulations and Best Practices for Securing an IA or IA-Enabled Device (Operating System, Network, Application Software, etc.) A Guide for Information Security. Mandated in DODD 8500.1, DODI 8500.2 and endorsed by CJCSI 6510.01, AR 25-2, and AFI 33-202. The goals of STIG are to provide Intrusion Avoidance, Intrusion Detection, Security Implementation Guidance, Response and Recovery. DISA STIGs offers configuration guides and checklists for: Databases, Operating Systems, Web Servers, Etc... Also provides standard...

Words: 651 - Pages: 3

Premium Essay

Research

...Unit 8 Lab 8: Auditing the Remote Access Domain for Compliance Larry Sanchez IS4680 5/12/2014 Remote Access Domain, when using this you are access resources that our outside you organizational resources to access your organizations network. A lot of this accessing of resources compromises of sensitive data. This makes it a lot more accessible to attackers or hackers due to the perimeter of the network being so far extended and the attackers or hackers could be able to find a breach in the network perimeter. Having a weak VPN that has no layers of security can and will give hackers or attackers the window of opportunity that they need to get to our network. We need to watch what kind of software that our user's are using. If our remote users are using different software than what we have at our company headquarters than there could be a possible risk. The software can be suspicious, especially if the user downloaded it from the Internet. the software in question could lead to incoming viruses and worms that can affect our network. This can create holes in the security that has been set up. Configuration settings can lead a user to let in viruses and worms also. If the remote user does know how to set up their configuration settings on their machines than anything that they send or receive can be a potential risk, threat, and vulnerability to our network. Once an employee takes their laptop home they are no longer protected by the organizations firewalls. This can...

Words: 716 - Pages: 3

Free Essay

Auditing

...Timothy Hicks IS4680 Lab7 Auditing the LAN-to-WAN Domain for Compliance 1. People threats, Viruses and related threats, physical threats, pc vulnerability, the pc virus, lan access and internetworking. 2. An access control list (ACL) is a list of access control entries (ACE). Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied, or audited for that trustee. ACLs contain access control entries (or ACEs) that describe the permissions associated with objects and object properties. For a security principal, an ACE defines the rights which are denied, allowed and audited for a particular security principal. 3. A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer. An example of this is a proxy server, and all other services are removed or limited to reduce the threat to the computer. It is hardened in this manner primarily due to its location and purpose, which is either on the outside of the firewall or in the DMZ and usually involves access from untrusted networks or computers. 4.Two examples of an enclave requirement are 1) a set of resources requires uninterrupted 24/7 availability. And 2) Proprietary information must be shared must be shared among several computers. 5.SPI is a basic firewalling feature...

Words: 653 - Pages: 3

Premium Essay

Test

...of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP...

Words: 2305 - Pages: 10

Premium Essay

Audit

...NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LL NOT FOR SALE OR DISTRIBUT © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION Student Lab Manual © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LL NOT FOR SALE OR DISTRIBUT Auditing IT Infrastructures for Compliance © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION IS4680 © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LL NOT FOR SALE OR DISTRIBUT © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett©Learning, LLC Learning, LLC, an Ascend Learning Company Bartlett Current Version Date: 11/21/2011 © Jones & Learning, LLC Copyright 2013 by Jones & Bartlett www.jblearning.com! NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION All Rights Reserved. -1- ...

Words: 30948 - Pages: 124