Security Measure in CBIS

Embed Size (px)

Citation preview

  • 7/29/2019 Security Measure in CBIS

    1/4

    Security Measure in CBIS

    1.Access to system Access to systems should be limited toauthorized and responsible personnel

    only. Example: The use of personal identification

    number (PIN)

    Prevention from making morethan three incorrect attempts

    Fingerprint, voice prints andpassword

    2.The security of data Application software and operatingsystems should be properly

    safeguarded against unauthorized

    access.

    3.Security backups Data and application software need toback up so that the copies can be used

    to restore the originals in case a

    corruption occurs. The backup of the

    application software should be checked

    at frequent intervals to ensure that it

    has not come corrupted in storage. The

    data file need to be backed up more

    frequently as the numerical values in

    the files changes at every processing

  • 7/29/2019 Security Measure in CBIS

    2/4

    Type of Risk

    Type of Risk Examples

    Unintentional Errors

    These errors may appear in input dataor during processing that will damage

    the accuracy and reliability of a firms

    files and outputs

    Accidentally striking the wrongkey on a terminal keyboard

    An incorrectly written computerprogram producing

    computational errors

    Deliberate Errors

    These errors constitute fraud. They may

    appear in input data, during processing

    or in generated outputs that will

    damage the accuracy and reliability of a

    firms files and outputs

    Deliberately increase the amounton a check received from a

    customer

    Unintentional losses of assets

    A firms assets including data may be

    accidentally lost or misplaced

    Goods may be put into the wrongwarehouse bins the lead to

    pickers unable to find them when

    filling orders

    A file stored on a magnetic diskmay be wiped out by a sudden

    power surge

    Thefts of assetsA firms assets may be stolen or

    misappropriated.

    Thieves that break into a firmsstoreroom

    Embezzlement and larcenyBreaches of security

    Unauthorized access to firms data files

    and reports

    A hacker may break into a firmscomputerized files

    An employee may peek at asalary report in an unlocked file

    drawer

    Act of violence and natural

    disasters

    Act of violence and natural disasters

    may damage a firms assets, including

    data.

    Sabotage of computer facilities Fires that engulf computer rooms Hurricanes and floods

  • 7/29/2019 Security Measure in CBIS

    3/4

    Data Coding in Computer-based Systems

    Classification of data is grouping the data into classes of data according to a

    certain classification plan. Coding of data is the assignment of symbols, such as

    letters and numbers, in accordance with a classification plan.

    Attributes of codes

    A coding system that supports a firms classification plan should:

    Uniquely identify objects Be as concise and simple as possible Allow for expected growth in the foreseeable future Be standardized throughout all functions and level within a firm

  • 7/29/2019 Security Measure in CBIS

    4/4

    Coding System

    Coding System Examples

    Mnemonic coding system

    A code that provides visible cluesconcerning that objects it represent

    AZ for Arizona

    WSW-P175R-14 represent a whitesidewall radial tire of a specific size.

    Sequence coding system

    Assigning numbers or letters in

    consecutive order

    Sequence codes in checks and sales

    invoices

    Block coding system

    Assigning series of numbers within a

    sequence to entities or event having

    common features

    Customer number may be blocked by

    sales territory:

    1-4999 Southern

    5000-9999 Northern

    Group coding system

    A refinement of the block code. It is a

    group coding system that has two or

    more sub-codes that identify facets

    pertaining to an object.

    5-73-201 is group coding for a type of

    raw material stored by a metal products

    manufacturer. The description of the

    group code is as follows:

    5 Steel rods

    73 Stored in the 7th

    bin row on the 3rd

    bin self

    201 20 feet long and 1sequence inch in

    the cross section