掃碼下載APP
及時接收考試資訊及
備考信息
ACCA P3考試:INFORMATION TECHNOLOGY
Online, real time systems can pose particular risks because any number of employees could be authorised to process certain transactions. Anonymity raises the prospect of both carelessness and fraud so it is important to be able to trace all transactions to their originator. This can be done by requiring users to log-on and then tagging each transaction with the identity of the person responsible. Logging on should require passwords and it is important that members of staff keep these confidential. Many business systems enforce a rule that requires passwords to be changed every few months. This is fine in theory, but to remember their changing passwords many users start to write them down – a potential breach in security. Increasingly, biometric measurement, such as fingerprint or retina recognition, can be used to control access.
Log-in security, whether through passwords or biometrics, also helps to control both processing and access to data. Each user is provided with tailored rights that allow them to see only certain data, change only certain data and to carry out only specified processing.
CONCLUSION
This article has mentioned encryption, firewalls authentication and access controls. It is important to realise that even with these measures in place that organisations can be damaged by lapses in computer security. For example:
• November to early December 2013, Target Corporation (turnover around $70bn) announced that data from around 70 million credit and debit cards was stolen.
• April 2011, Sony experienced a data breach within their Playstation Network that the information of 77 million users was compromised.
• May 2014, Ebay announced that three months earlier that information (including passwords, email addresses, birth dates, mailing addresses and other personal information) relating to 145 million users had been stolen. Ebay states that the information was encrypted and there is no evidence that is has been decrypted (yet).
Cyber-espionage is also a growing threat. Governments, competitors and criminals attempt to steal intellectual property or information about customers and contracts. Quite obviously the theft of valuable know-how will undermine a company’s competitive advantage and it is essential that for organisations to defend themselves as far as possible against these threats.
Ken Garrett is a freelance lecturer and writer
Copyright © 2000 - www.electedteal.com All Rights Reserved. 北京正保會計科技有限公司 版權所有
京B2-20200959 京ICP備20012371號-7 出版物經營許可證 京公網安備 11010802044457號
套餐D大額券
¥
去使用 主站蜘蛛池模板: 91精品国产色综合久久 | 国产精品三级在线 | 日本在线免费播放 | 在线 日本 制服 中文 欧美 | 欧美xxxx18| 亚洲精品久久久久久国产 | 色综合久久综合 | 亚洲国产精品一区二区三区 | 日韩精品欧美精品 | 亚洲国产精品99久久久久久久久 | 中文字幕欧美在线 | 精品国产一区二区三区在线观看 | 精品黄色在线 | 亚洲国产精品一区二区第一页 | 天堂成人国产精品一区 | 国产精品久久久久久久久免费看 | 色综合视频在线观看 | 中文字幕一区二区三区中文字幕 | 日韩免费一级 | 久久精品亚洲国产 | 久久99精品久久久久婷婷 | 欧美成人手机在线 | 亚洲国产二区 | 一区二区三区在线免费视频 | 亚洲精品一区二区在线 | 欧美日韩在线观看视频 | 日韩久久综合 | 精一区二区| 国产一区二区自拍视频 | 日韩一区二区三区四区五区 | 久久久网站免费 | 一本色道久久88综合亚洲精品ⅰ | 成人免费网站 | 精品一区久久 | 黄免费网站| 久久精品观看 | 欧美 日韩 国产 成人 在线 91 | 深夜影院一级毛片 | 一区二区三区av在线 | 成人免费看 | 亚洲欧美激情精品一区二区 |