Vulnerabilities and Threats to AIS Security Systems

Dola Ramalinda (1), Agung Raharja (2)
(1) Universitas Bandung, Indonesia,
(2) Universitas Bandung, Indonesia

Abstract

This research explores vulnerabilities and threats to Accounting Information Systems (AIS) and evaluates effective mitigation measures to address these issues. Using both qualitative and quantitative approaches, this research involved literature studies, surveys, expert interviews, and case analysis to identify and analyze the different types of vulnerabilities and threats faced by AIS. The results showed that human error, software flaws, and system integration complexity are the main sources of vulnerabilities in AIS. The most common threats are cyberattacks, insider threats, and Distributed Denial of Service (DDoS) attacks. The impact of these threats includes financial loss, reputational damage, and significant legal implications.Mitigation strategies identified include the development of robust security policies, the use of cutting-edge security technologies, and the conduct of regular audits and monitoring. The findings emphasize the importance of a layered approach to improving AIS security and reliability. This research provides an in-depth insight into how organizations can identify, evaluate and manage vulnerabilities and threats to their AIS, which is essential for maintaining the integrity, confidentiality and availability of accounting data in an increasingly complex digital age.

Full text article

Generated from XML file

References

Angraini, G. (2014). Analisis Kemampuan Literasi Sains Peserta Didik SMA Kelas X di Kota Solok. Jurnal Pendidikan Matematika dan Sains. Jurnal Pendidikan Matematika dan Sains., 1(4), 161–170.

Latifah, N., & Arisyahidin. (2022). Analisis Sistem Informasi Akuntansi dan Pengendalian Internal terhadap Kinerja Karyawan (Studi Kasus PT Bintang Kediri). Otonom, 22(8.5.2017), 2003–2005.

Muchsam, Y., Sucipto, B., Rismawati, R., Rusdianti, I. S., & Raharja, A. R. (2023). Forming the Character of a Physically Healthy Young Generation Through Military Education. TGO Journal of Community Development, 1(2), 90–95. https://doi.org/10.56070/jcd.2023.015

Raharja, Agung Rachmat, H. I. (2024). Design of EMR (Electronic Medical Record) Applications Using RFID Cards to Record Patient Medical Record Data at The Sukajadi Bandung Health Center. 66–72.

Raharja, A. R., Pramudianto, A., & Muchsam, Y. (2024). Penerapan Algoritma Decision Tree dalam Klasifikasi Data “ Framingham ” Untuk Menunjukkan Risiko Seseorang Terkena Penyakit Jantung dalam 10 Tahun Mendatang. nawalaeducation, 1(1). https://doi.org/10.62872/cwgzp962

Raharja, A. R., Setiyono, R., & Hariyanti, I. (2024). PERANCANGAN DAN IMPLEMENTASI CALIFORNIA BEARING RATIO (CBR) DENGAN MENGGUNAKAN C# DAN ARDUINO. Jurnal Responsif?: Riset Sains dan Informatika, 6(1), 54–62. https://doi.org/10.51977/jti.v6i1.1425

Sutisna, T., Raharja, A. R., Hariyadi, E., Hafizh, V., & Putra, C. (2024). Penggunaan Computer Vision untuk Menghitung Jumlah Kendaraan dengan Menggunakan Metode SSD ( Single Shoot Detector ). 4, 6060–6067. https://doi.org/doi.org/10.31004/innovative.v4i2.10071

Tuasamu, Z., M. Lewaru, N. A. I., Idris, M. R., Syafaat, A. B. N., Faradilla, F., Fadlan, M., Nadiva, P., & Efendi, R. (2023). Analisis Sistem Informasi Akuntansi Siklus Pendapatan Menggunakan DFD Dan Flowchart Pada Bisnis Porobico. Jurnal Bisnis Manajemen, 1(2), 495–510.

Authors

Dola Ramalinda
dolaramalinda@bandunguniversity.ac.id (Primary Contact)
Agung Raharja
Ramalinda, D., & Raharja, A. (2024). Vulnerabilities and Threats to AIS Security Systems. Journal of Computer Science Advancements, 2(3), 176–182. https://doi.org/10.70177/jsca.v2i3.1055

Article Details

Most read articles by the same author(s)

No Related Submission Found