Computer Science

  1. During your reading, you learned about GLBA. Please conduct additional research and address the following questions in your responses. Include examples to support your viewpoint.
  • What was evolutionary about the GLBA?
  • What do organizations need to consider to be compliant with GLBA?
  • What additional changes would you suggest to further enhance GLBA?

AlphaCo Inc. is a global distributor of a diversified range of mechanical, electrical, and electronic systems and components such as semiconductors, liquid crystal displays, data communications equipment and supplies, electromechanical devices, mechanical and electrical power transmission products, bearings, conveyor components, electric motors, industrial computer products and subsystems, and so forth. It operates in 150 countries across Africa, Asia, Eurasia, Europe, Australia, North America, and South America. It has 105 distribution centers worldwide and sales offices or representatives in 95 countries. The firm is headquartered in the U.S.

AlphaCo operates in a highly competitive environment worldwide. It does business with manufacturers, distributors, and resellers who sell directly to end-users. AlphaCo has a very diverse product line. It markets and distributes more than 500,000 products from over 5000 suppliers. The diverse product line enables the firm to serve as a one-stop-shop for many customers. To provide quick order taking and fulfillment capabilities and consistent, timely and accurate delivery around the world, AlphaCo invested heavily in IT. The core IT infrastructure of the firm relies on mainframes. But it also includes a variety of IT hardware and operating system platforms that were inherited from mergers and acquisitions.

Don't use plagiarized sources. Get Your Custom Essay on
Computer Science
Just from $13/Page
Order Essay

AlphaCo’s order management system provides service to manufacturers and resellers via the internet. It acts as a channel middle-man between manufacturers and resellers. The company’s business dependency on the internet requires maintaining assurance around the integrity of transactions. To address the security threats posed by e-commerce, AlphaCo uses Secure Socket Layer, which provides 128-bit encryption of packets to and from its e-commerce clients. Furthermore, all manufacturers and resellers are required to authenticate themselves as legitimate business partners.

In early 2002, the accounts receivable department of AlphaCo discovered a significant amount of uncollected accounts while performing an aging analysis. These accounts totaled in the millions and were tracked to shipments to an Aegean Island. Several of the accounts were listed under the same address. Further reviews revealed that the accounts were fraudulent. A hacker penetrated the online order management system of the firm, created fake accounts, and placed about 50 fraudulent orders over a period of three months and stole shipments totaling approximately $20 million.

AlphaCo’s Board quickly met to devise a plan of action. The Chief Information Officer urged management to increase the IT budget so they could undertake a full computer forensics investigation to identify and fix the IT security vulnerabilities of the firm. The Chief Financial Officer wanted the IT department to adhere to its current budget noting that the current budget was above the industry standard. The Director of Internal Audit reminded the board of two requirements the CEO and CFO would have to comply within alignment to Sarbanes-Oxley (SOX) Act of 2002:

  • Section 302 – requires the Chief Executive Officer and Chief Financial Officer of a public company to certify quarterly and annually that they are responsible for disclosure controls, they have designed controls to ensure that material information is known to them, evaluated the effectiveness of controls, presented their conclusions in the filing, and disclosed to the audit committee and auditors significant control deficiencies and acts of fraud.
  • Section 404 – the Chief Executive Officer and Chief Financial Officer must annually state their responsibility for establishing and maintaining an adequate internal control structure and procedures for financial reporting, conduct, and provide an assessment of the effectiveness of the enterprise’s internal controls.

The Director of Internal Audit informed the Board that her department recently adopted COSO and COBIT frameworks for thinking about internal controls around the firm’s business processes and the supporting IT systems. She emphasized her department would need more budget to implement the internal control best practices identified in these frameworks.

The Chief Information Officer, IT department, and a team of external consultants conducted varied scenarios to determine how the hacker penetrated AlphaCo’s order management system. They reasoned that the hacker initially penetrated AlphaCo’s online system by exploiting an unpatched service running on an exposed web server. The exploit gave the hacker root access, which was used to view connection strings to the order management system’s database. The database resided within AlphaCo’s internal network. Using the database connection strings and spoofing web server identity, the hacker was able to connect to the database and execute SQL statements. At that point, the hacker had the ability to create fake accounts from which to place the fraudulent orders. The network penetration did not stop there. Through the database, extended stored procedures were used to discover yet another unpatched service and install password sniffers, which were used to unauthorized virtual private network (VPN) connections. A reverse tunnel was created using the exploited service thus connecting the database server to the hacker’s local workstation. The database server was then used as a proxy to discover other critical servers on the network and the services they owned.

Despite the plausibility of this initial scenario, others were possible to explain the hacking incident. The Chief Information Officer wondered what else they needed to do to prevent hacking attempts and to detect an incident sooner if hackers manage to compromise their systems again in the future.

Source: Tanriverdi, H., Bertsch, J., Harrison, J., Hsiao, P., Mesuria, K., &Hendrawirawan, D. (2006). AlphaCo: A teaching case on information technology audit and security. Journal of Digital Forensics, Security and Law, 1(1), 45 – 68. (Links to an external site.)

Case Questions

Using the case above, conduct supplemental research using scholarly resources and answer the following questions as a starting point to illustrate your research. Your response should be at a minimum 2 to 4 pages double-spaced using APA formatting.

  • How and why are IT controls relevant to financial reporting?
  • What internal control weaknesses allowed the hacker to break into AlphaCo’s IT systems?
  • What types of internal controls can be designed to prevent future occurrences of hacking?
  • What are the managers’ responsibilities for detecting and reporting fraud?

Assignment Submission

  • Draft a 2 – 4 page, response in a new Microsoft Word document
  • Utilize at least three (3) cited outside sources, using APA citation format
  1. During your reading, you learned about different laws protecting children’s online information including the Children’s Online Privacy Protection Act, the Children’s Internet Protection Act, and the Family Educational Rights and Protection Act.
    For this discussion, please conduct additional research and consider the following questions in your response:
  • Why are children more at risk online?
  • How does current legislation work to protect children? Provide examples.
  • What could you teach children to help them be safer online?
  1. Overview

Over the last two weeks, we’ve explored considerations regarding the security and privacy of consumer financial information and healthcare information, amongst others. For this assignment, you’ll pick one of two fictitious organizations and write a five to ten (5 to 10) slide, narrated implementation plan, presentation, directed towards executive leadership with a moderate knowledge of IT. You can choose either:

  • Bank XYZ– a financial institution that engages in financial activities and must protect nonpublic personal information
  • org– a covered entity that transmits health information in electronic form

Implementation Plan Requirements

At a minimum, your PowerPoint presentation should include the following sections:

  • Introduction– describe the industry the organization works in, the importance of security and privacy to the organization, and the type of sensitive information being protected.
  • Industry-specific legal considerations– describe, at a minimum, the federal regulations in place the organization must comply with and the specific requirements. You can be creative and also incorporate state laws and other industry standards.
  • Threat landscape and impact– describe the potential threats or attacks facing the organization and the business, consumer, or societal impacts if the leadership team does not take these concerns seriously. Leverage real-world examples to augment your discussion.
  • Action Plan- describe examples of administrative, technical, and operational controls the organization could implement and any other associated strategic recommendations.
  • Leadership Requests– elaborate on any specific resources, funding, or other support you need from leadership for your plan to be successful.

Assignment Submission

  • Drafta Seven (7)-slide, narrated presentation
  • Utilizeat least five (5) cited outside sources, using APA citation format – including these as the end of your presentation


Place Order
Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Try it now!

Grab A 14% Discount on This Paper

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.