华南俳烁实业有限公司

考試首頁 | 考試用書 | 培訓(xùn)課程 | 模擬考場(chǎng) | 考試論壇  
  當(dāng)前位置:考試網(wǎng) >> ACCA/CAT >> 備考指導(dǎo) >> 文章內(nèi)容
  

ACCAP3知識(shí)點(diǎn):INFORMATIONTECHNOLOGY(六)

考試網(wǎng)  [ 2016年8月30日 ] 【

  ACCA P3考試:INFORMATION TECHNOLOGY

  Online, real time systems can pose particular risks because any number of employees could be authorised to process certain transactions. Anonymity raises the prospect of both carelessness and fraud so it is important to be able to trace all transactions to their originator. This can be done by requiring users to log-on and then tagging each transaction with the identity of the person responsible. Logging on should require passwords and it is important that members of staff keep these confidential. Many business systems enforce a rule that requires passwords to be changed every few months. This is fine in theory, but to remember their changing passwords many users start to write them down – a potential breach in security. Increasingly, biometric measurement, such as fingerprint or retina recognition, can be used to control access.

  Log-in security, whether through passwords or biometrics, also helps to control both processing and access to data. Each user is provided with tailored rights that allow them to see only certain data, change only certain data and to carry out only specified processing.

  CONCLUSION

  This article has mentioned encryption, firewalls authentication and access controls. It is important to realise that even with these measures in place that organisations can be damaged by lapses in computer security. For example:

  • November to early December 2013, Target Corporation (turnover around $70bn) announced that data from around 70 million credit and debit cards was stolen.

  • April 2011, Sony experienced a data breach within their Playstation Network that the information of 77 million users was compromised.

  • May 2014, Ebay announced that three months earlier that information (including passwords, email addresses, birth dates, mailing addresses and other personal information) relating to 145 million users had been stolen. Ebay states that the information was encrypted and there is no evidence that is has been decrypted (yet).

  Cyber-espionage is also a growing threat. Governments, competitors and criminals attempt to steal intellectual property or information about customers and contracts. Quite obviously the theft of valuable know-how will undermine a company’s competitive advantage and it is essential that for organisations to defend themselves as far as possible against these threats.

  Ken Garrett is a freelance lecturer and writer

本文糾錯(cuò)】【告訴好友】【打印此文】【返回頂部
將考試網(wǎng)添加到收藏夾 | 每次上網(wǎng)自動(dòng)訪問考試網(wǎng) | 復(fù)制本頁地址,傳給QQ/MSN上的好友 | 申請(qǐng)鏈接 | 意見留言 TOP
關(guān)于本站  網(wǎng)站聲明  廣告服務(wù)  聯(lián)系方式  站內(nèi)導(dǎo)航  考試論壇
Copyright © 2006-2019 考試網(wǎng)(Examw.com) All Rights Reserved  營(yíng)業(yè)執(zhí)照
腾冲县| 团风县| 徐州市| 永川市| 秭归县| 漳浦县| 滨海县| 宁河县| 额敏县| 宁乡县| 鄂托克旗| 广宗县| 泗水县| 曲松县| 清水河县| 宜宾市| 定西市| 济阳县| 特克斯县| 柘城县| 泾源县| 客服| 阿拉尔市| 台南县| 眉山市| 荔浦县| 通许县| 凤凰县| 东山县| 资溪县| 登封市| 莱阳市| 前郭尔| 海丰县| 平山县| 石渠县| 镇宁| 江陵县| 仪陇县| 柞水县| 深水埗区|