Upload
ameerul-effendi
View
216
Download
0
Embed Size (px)
Citation preview
7/29/2019 Security Measure in CBIS
1/4
Security Measure in CBIS
1.Access to system Access to systems should be limited toauthorized and responsible personnel
only. Example: The use of personal identification
number (PIN)
Prevention from making morethan three incorrect attempts
Fingerprint, voice prints andpassword
2.The security of data Application software and operatingsystems should be properly
safeguarded against unauthorized
access.
3.Security backups Data and application software need toback up so that the copies can be used
to restore the originals in case a
corruption occurs. The backup of the
application software should be checked
at frequent intervals to ensure that it
has not come corrupted in storage. The
data file need to be backed up more
frequently as the numerical values in
the files changes at every processing
7/29/2019 Security Measure in CBIS
2/4
Type of Risk
Type of Risk Examples
Unintentional Errors
These errors may appear in input dataor during processing that will damage
the accuracy and reliability of a firms
files and outputs
Accidentally striking the wrongkey on a terminal keyboard
An incorrectly written computerprogram producing
computational errors
Deliberate Errors
These errors constitute fraud. They may
appear in input data, during processing
or in generated outputs that will
damage the accuracy and reliability of a
firms files and outputs
Deliberately increase the amounton a check received from a
customer
Unintentional losses of assets
A firms assets including data may be
accidentally lost or misplaced
Goods may be put into the wrongwarehouse bins the lead to
pickers unable to find them when
filling orders
A file stored on a magnetic diskmay be wiped out by a sudden
power surge
Thefts of assetsA firms assets may be stolen or
misappropriated.
Thieves that break into a firmsstoreroom
Embezzlement and larcenyBreaches of security
Unauthorized access to firms data files
and reports
A hacker may break into a firmscomputerized files
An employee may peek at asalary report in an unlocked file
drawer
Act of violence and natural
disasters
Act of violence and natural disasters
may damage a firms assets, including
data.
Sabotage of computer facilities Fires that engulf computer rooms Hurricanes and floods
7/29/2019 Security Measure in CBIS
3/4
Data Coding in Computer-based Systems
Classification of data is grouping the data into classes of data according to a
certain classification plan. Coding of data is the assignment of symbols, such as
letters and numbers, in accordance with a classification plan.
Attributes of codes
A coding system that supports a firms classification plan should:
Uniquely identify objects Be as concise and simple as possible Allow for expected growth in the foreseeable future Be standardized throughout all functions and level within a firm
7/29/2019 Security Measure in CBIS
4/4
Coding System
Coding System Examples
Mnemonic coding system
A code that provides visible cluesconcerning that objects it represent
AZ for Arizona
WSW-P175R-14 represent a whitesidewall radial tire of a specific size.
Sequence coding system
Assigning numbers or letters in
consecutive order
Sequence codes in checks and sales
invoices
Block coding system
Assigning series of numbers within a
sequence to entities or event having
common features
Customer number may be blocked by
sales territory:
1-4999 Southern
5000-9999 Northern
Group coding system
A refinement of the block code. It is a
group coding system that has two or
more sub-codes that identify facets
pertaining to an object.
5-73-201 is group coding for a type of
raw material stored by a metal products
manufacturer. The description of the
group code is as follows:
5 Steel rods
73 Stored in the 7th
bin row on the 3rd
bin self
201 20 feet long and 1sequence inch in
the cross section