24周年

財稅實務(wù) 高薪就業(yè) 學(xué)歷教育
APP下載
APP下載新用戶掃碼下載
立享專屬優(yōu)惠

安卓版本:8.7.11 蘋果版本:8.7.11

開發(fā)者:北京正保會計科技有限公司

應(yīng)用涉及權(quán)限:查看權(quán)限>

APP隱私政策:查看政策>

HD版本上線:點擊下載>

2016年ACCAP3知識點:INFORMATION TECHNOLOGY(六)

來源: 正保會計網(wǎng)校 編輯: 2016/01/14 11:09:52 字體:

ACCA P3考試:INFORMATION TECHNOLOGY

Online, real time systems can pose particular risks because any number of employees could be authorised to process certain transactions. Anonymity raises the prospect of both carelessness and fraud so it is important to be able to trace all transactions to their originator. This can be done by requiring users to log-on and then tagging each transaction with the identity of the person responsible. Logging on should require passwords and it is important that members of staff keep these confidential. Many business systems enforce a rule that requires passwords to be changed every few months. This is fine in theory, but to remember their changing passwords many users start to write them down – a potential breach in security. Increasingly, biometric measurement, such as fingerprint or retina recognition, can be used to control access.

Log-in security, whether through passwords or biometrics, also helps to control both processing and access to data. Each user is provided with tailored rights that allow them to see only certain data, change only certain data and to carry out only specified processing.

CONCLUSION

This article has mentioned encryption, firewalls authentication and access controls. It is important to realise that even with these measures in place that organisations can be damaged by lapses in computer security. For example:

• November to early December 2013, Target Corporation (turnover around $70bn) announced that data from around 70 million credit and debit cards was stolen.

• April 2011, Sony experienced a data breach within their Playstation Network that the information of 77 million users was compromised.

• May 2014, Ebay announced that three months earlier that information (including passwords, email addresses, birth dates, mailing addresses and other personal information) relating to 145 million users had been stolen. Ebay states that the information was encrypted and there is no evidence that is has been decrypted (yet).

Cyber-espionage is also a growing threat. Governments, competitors and criminals attempt to steal intellectual property or information about customers and contracts. Quite obviously the theft of valuable know-how will undermine a company’s competitive advantage and it is essential that for organisations to defend themselves as far as possible against these threats.

Ken Garrett is a freelance lecturer and writer

我要糾錯】 責任編輯:藍色天空

免費試聽

  • Jessie《FR 財務(wù)報告》

    Jessie主講:《FR 財務(wù)報告》免費聽

  • 張宏遠《MA 管理會計》

    張宏遠主講:《MA 管理會計》免費聽

  • 何 文《SBL 戰(zhàn)略商業(yè)領(lǐng)袖》

    何 文主講:《SBL 戰(zhàn)略商業(yè)領(lǐng)袖》免費聽

限時免費資料

  • 近10年A考匯總

    歷年樣卷

  • 最新官方考試大綱

    考試大綱

  • 各科目專業(yè)詞匯表

    詞匯表

  • ACCA考試報考指南

    報考指南

  • ACCA考官文章分享

    考官文章

  • 往年考前串講直播

    思維導(dǎo)圖

回到頂部
折疊
網(wǎng)站地圖

Copyright © 2000 - odtgfuq.cn All Rights Reserved. 北京正保會計科技有限公司 版權(quán)所有

京B2-20200959 京ICP備20012371號-7 出版物經(jīng)營許可證 京公網(wǎng)安備 11010802044457號