{"id":3183,"date":"2020-10-24T04:00:01","date_gmt":"2020-10-24T08:00:01","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5121fall16\/?p=3183"},"modified":"2018-12-07T12:12:07","modified_gmt":"2018-12-07T17:12:07","slug":"week-8","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/2020\/10\/24\/week-8\/","title":{"rendered":"Week 8: Security 2, Finance 2 Wrap-up"},"content":{"rendered":"<p>Continuing great job on the discussions. Keep up the good work. \u00a0 My\u00a0summary view is:<\/p>\n<p><strong>Q1<\/strong>: Do businesses rely too much on security administrators vs. security of the entire network? \u00a0Most of you highlighted the network being the highest risk. \u00a0I tend to agree with you &#8211; as in today&#8217;s computer environments, the network get&#8217;s you in the door. \u00a0Nevertheless, it&#8217;s important to manage all areas of security and make sure even the administrators are using state of the art practices and techniques. \u00a0 Risks are everywhere.<\/p>\n<p><strong>Q2<\/strong>: Why only have one posting period open at a time? As you pointed out, this is mainly to prevent errant postings in the wrong month. \u00a0It also supports the discipline of making sure when events occur in the real or physical world, the corresponding transaction(s) occur in the ERP system.<\/p>\n<p><strong>Q3<\/strong>: What&#8217;s the most important finance \/ accounting control? &#8230;authorization control? Some good discussion on this question. \u00a0I would have preferred you using my list to prioritize but most of you didn&#8217;t have that list due to my late posting of the video. \u00a0My experience is that documented policies &amp; procedures with strong reconciliation and auditing that they are followed is critical. \u00a0Focus as usual on the high value and high risk items.<\/p>\n<p><strong>Q4<\/strong>: Have you experienced difficult, cumbersome, &#8230; security problems? \u00a0Thanks for sharing some great stories of your real experiences. \u00a0Most of you highlighted password headaches. \u00a0Regardless, it&#8217;s important to understand the end results of what users are actually doing (law of unintended consequences). \u00a0If you lock down the process tight so everyone writes the password down on their screen &#8211; in the end you have poor security. \u00a0In the end, a balance is necessary &#8211; is the complexity worth the headache? \u00a0However, who gets to set balance is usually someone at the top of the organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Continuing great job on the discussions. Keep up the good work. \u00a0 My\u00a0summary view is: Q1: Do businesses rely too much on security administrators vs. security of the entire network? \u00a0Most of you highlighted the network being the highest risk. \u00a0I tend to agree with you &#8211; as in today&#8217;s computer environments, the network get&#8217;s [&hellip;]<\/p>\n","protected":false},"author":22812,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[767270],"tags":[],"class_list":{"0":"post-3183","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-8-security-2-finance-2","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/posts\/3183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/users\/22812"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/comments?post=3183"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/posts\/3183\/revisions"}],"predecessor-version":[{"id":4912,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/posts\/3183\/revisions\/4912"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/media?parent=3183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/categories?post=3183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5121sec701fall2019\/wp-json\/wp\/v2\/tags?post=3183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}