Cyber Security in Accounting 1
Cyber Security in Accounting 1
17.11.2021
INTRODUCTION
2
OBJECTIVES
1. Cyber attacks can take many forms and can have devastating consequences for accounting systems.
It is important to be aware of the different types of cyber attacks that can occur and take measures
to prevent them.
• Phishing attacks - These attacks use fake emails or websites to trick users into giving away
sensitive information like passwords or credit card numbers.
• Malware attacks - Malware is software designed to damage or disrupt computer systems. This can
include viruses, Trojans, and ransomware.
• Denial of service attacks - These attacks overload a system with traffic, making it unavailable to
users. This can be used to disrupt business operations or as a cover for other types of attacks.
• Man-in-the-middle attacks - These attacks intercept communication between two parties and can be
used to steal information or modify data.
3
BEST PRACTICES FOR
SAFEGUARDING SENSITIVE
DATA
• Encryption
• Encrypt all sensitive data in transit
and at rest to prevent unauthorized
access.
• Multi-factor Authentication
• Require multi-factor authentication
for all users to add an additional
layer of security.
4
EMPLOYEE TRAINING AND AWARENESS
6
INCIDENT RESPONSE PLAN
• Preparation
• Establish a clear incident response team and assign roles and responsibilities. Develop and regularly test an
incident response plan that includes procedures for identifying, containing, and mitigating incidents.
• Identification
• Establish procedures for detecting incidents, such as monitoring systems for unusual activity or receiving
reports from employees. Develop a clear definition of what constitutes an incident and establish criteria for
escalation.
• Containment
• Establish procedures for containing incidents, such as disconnecting affected systems from the network or
shutting down affected services. Establish criteria for determining when to escalate an incident to the next
level of response.
• Mitigation
• Develop procedures for mitigating the impact of incidents, such as restoring systems from backups or
applying patches to vulnerabilities. Establish criteria for determining when an incident has been fully
mitigated and can be closed.
7
CONCLUSION
We've learned about the dangers in the
digital world, how to actively defend
against them, and why following the rules
is crucial. Remember, trust is like our
treasure, and we've uncovered ways to keep
it safe. By understanding the risks and
using strong strategies, we're creating a
shield for our important data. As we end
our talk, let's keep this cybersecurity
mindset alive, protecting our digital world
like superheroes guarding a valuable
treasure.
8
THANK YOU