掃碼下載APP
及時接收考試資訊及
備考信息
ACCA P3考試:INFORMATION TECHNOLOGY
Online, real time systems can pose particular risks because any number of employees could be authorised to process certain transactions. Anonymity raises the prospect of both carelessness and fraud so it is important to be able to trace all transactions to their originator. This can be done by requiring users to log-on and then tagging each transaction with the identity of the person responsible. Logging on should require passwords and it is important that members of staff keep these confidential. Many business systems enforce a rule that requires passwords to be changed every few months. This is fine in theory, but to remember their changing passwords many users start to write them down – a potential breach in security. Increasingly, biometric measurement, such as fingerprint or retina recognition, can be used to control access.
Log-in security, whether through passwords or biometrics, also helps to control both processing and access to data. Each user is provided with tailored rights that allow them to see only certain data, change only certain data and to carry out only specified processing.
CONCLUSION
This article has mentioned encryption, firewalls authentication and access controls. It is important to realise that even with these measures in place that organisations can be damaged by lapses in computer security. For example:
• November to early December 2013, Target Corporation (turnover around $70bn) announced that data from around 70 million credit and debit cards was stolen.
• April 2011, Sony experienced a data breach within their Playstation Network that the information of 77 million users was compromised.
• May 2014, Ebay announced that three months earlier that information (including passwords, email addresses, birth dates, mailing addresses and other personal information) relating to 145 million users had been stolen. Ebay states that the information was encrypted and there is no evidence that is has been decrypted (yet).
Cyber-espionage is also a growing threat. Governments, competitors and criminals attempt to steal intellectual property or information about customers and contracts. Quite obviously the theft of valuable know-how will undermine a company’s competitive advantage and it is essential that for organisations to defend themselves as far as possible against these threats.
Ken Garrett is a freelance lecturer and writer
歷年樣卷
考試大綱
詞匯表
報考指南
考官文章
思維導(dǎo)圖
安卓版本:8.7.93 蘋果版本:8.7.93
開發(fā)者:北京正保會計科技有限公司
應(yīng)用涉及權(quán)限:查看權(quán)限>
APP隱私政策:查看政策>
HD版本上線:點擊下載>
官方公眾號
微信掃一掃
官方視頻號
微信掃一掃
官方抖音號
抖音掃一掃
Copyright © 2000 - www.electedteal.com All Rights Reserved. 北京正保會計科技有限公司 版權(quán)所有
京B2-20200959 京ICP備20012371號-7 出版物經(jīng)營許可證 京公網(wǎng)安備 11010802044457號
套餐D大額券
¥
去使用 主站蜘蛛池模板: 白色丝袜美女羞羞av | 狠狠狠狠干 | 伊人黄| 狠狠干夜夜 | 国产精品自产拍在线观看桃花 | 精品久久精品 | 亚洲国产精品一区二区久久 | 午夜精品久久久久久久久久久 | 天堂在线观看 | 亚洲成人精品 | a级一级毛片 | 亚洲国产高清在线 | 国产福利一区二区 | 久久国产精品久久久久久久久久 | 亚洲一区久久 | 国产黄色大片在线观看 | 国产一区二区三区在线看 | 91精品久久久久久久久久入口 | 欧美精品一区二区三区一线天视频 | 亚洲三区在线 | 免费观看一区 | 日批免费看 | 99精品国产在热久久婷婷 | av影视大全 | 日韩在线播放视频 | 久久精品不卡 | 在线看片日韩 | 81精品国产乱码久久久久久 | 久久久久久久一区 | 国产在线视频网 | 国产一区精品在线 | 国产黄色精品 | 成人一区视频 | 亚洲欧洲成人精品av97 | 午夜伦情电午夜伦情电影如如视频 | 国产曰批免费观看久久久 | 亚洲一区二区三区精品在线 | 国产高清毛片 | 日韩av网站在线 | 性欧美精品 | 国产 一区 |