You are on page 1of 6

DATABASE - Requires that all similar transactions be

grouped together
- Collection of data stored on the
- Best suited to application having large
computer
volumes of similar transactions
- Implies a single set of files that is shared
by each app ONLINE PROCESSING

RELATIONAL DATABASE - Each transaction is entered and


processed one at a time
- Stores data in several small 2
- Real-time processing system
dimensional tables that can be joined
together DATA WAREHOUSE
- Ex. Single customer having more than
- Integrated collection of enterprise-wide
one order
data that generally includes several
- Database that allows admin(s) and
years of nonvolatile data, used to
users to set up connections among
support management in decision
different data records
making and planning.
- Can be use in simple tasks
OPERATIONAL DATA BASE
MASTER FILES
- Contains the data Is continually updated
- Are the relatively permanent files that
as transaction processed
maintain detailed data for each major
process DATA MINING
- Permanent info necessary to process
payroll transactions - Process of searching data within data
warehouse
TRANSACTION FILES
STRUCTURED DATA
- Set of relatively temporary records that
will be processed to update the master - Easily fits into rows and columns
file - Columns usually are fields of fixed
lengths
TYPES OF ACCESS REQUIRED
UNSTRUCTED DATA
SEQUENTIAL ACCESS
- Does not easily fits into rows and
- Files store records in sequence columns
- Ex. Free-form text (twt, fb,)
RANDOM ACCESS FILES (DIRECT ACCESS FILES)
BIG DATA
- Not written/read in sequential order
- Known as high-volume, high-speed
INDEXED SEQUNTIAL ACCESS METHOD (ISAM)
information that may be so large and
- Stored sequentially but can also be diverse that it demands innovative
accessed randomly forms of IT processing

MODES OF PROCESSING IT ENABLEMENT

BACTH PROCESSING E- Business


- Use of electronic means to enhance - Process or procedure and it system to
business ensure that the person accessing the IT
- Encompasses all forms of online system is valid and authorized user
electronic trading - LOG IN means to make the computer
recognize you in order to create a
Electronic Data Interchange
connection at the beginning of a
- Is the intercompany, computer-to- computer session
computer transfer of business - To increase the effectiveness of log‐in
document in a standard business restriction, USER IDs must be unique for
format each user.
- “intercompany” 2 or more companies - A PASSWORD is a secret set of
conducts business electronically characters that identifies the user as the
- Virtual exchange of data or business authentic owner of that associated user
documents in electronic format ID
between trading partners - The smart card is plugged into the
computer’s card reader and helps
Point of Sale System authenticate that the user is valid. The
- System of hardware and software that smart card is a credit card–sized device
captures retail sales transaction by with an integrated circuit that displays a
stand bar coding constantly changing ID code
- A newer technology to authenticate
Automated Matching users is a security token, which plugs
- The software matches an invoice to its into the USB port and thereby
related purchase order and receiving eliminates the need for a card reader
report - The SMART CARD is plugged into the
computer’s card reader and helps
Evaluated Receipt Settlement authenticate that the user is valid. The
smart card is a credit card–sized device
- Invoice-less system in which computer
with an integrated circuit that displays a
hardware and software complete an
constantly changing ID code
invoice-less match comparing the
- A newer technology to authenticate
purchase order with the goods received
users is a SECURITY TOKEN, which plugs
E‐Payables and Electronic Invoice into the USB port and thereby
Presentment and Payment eliminates the need for a card reader
- BIOMETRIC DEVICES
- Both terms to web-enabled receipt and
- Use some unique physical
payment of vendor invoices
characteristic of the user to identify the
LESSON 2 user and allow the appropriate level of
access to that user
GENERAL CONROLS FOR IT SYSTEMS - All accesses should be logged. The
1. Authentication of users and limiting organization should maintain a
unauthorized access computer log of all log‐ins.
- Purpose of Logs:
- COMPUTER LOG is a complete record of WPA
all dates, times, and uses for each user - Can check to see whether encryption
- The log‐in procedures and logs establish keys have been tampered with
non- repudiation of users. SSID
Nonrepudiation means that a user - service set identifier- is a password that
cannot deny any particular act that he is passed between the sending and
or she did on the IT system receiving nodes of a wireless network
- User profile VPN
- AUTHORITY TABLE contains a list of - A virtual private network utilizes
valid authorized users and the access tunnels, authentication, and encryption
level granted to each one within the Internet network to isolate
- CONFIGURATION TABLE contains the Internet communications so that
appropriate set-up and security unauthorized users cannot access or
settings. Limit use access use certain data
2. Hacking and other network break-ins - The VPN traffic can be thought of as
FIRE WALL traveling through a separate tunnel
- is hardware, software, or a combination within the Internet network of public
of both that is designed to block lines
unauthorized access SSL
ENCRYPTION - communication protocol built into Web
- renders the data useless to those who server and browser software that
do not possess the correct encryption encrypts data transferred on that
key website
SYMMETRIC ENCRYPTION VIRUS
- uses a single encryption key that must - is a self‐ replicating piece of program
be used to encrypt data and also to code that can attach itself to other
decode the encrypted data programs and data and perform
PUBLIC KEY ENCRYPTION malicious actions such as deleting files
- encryption uses both a public key and a or shutting down the computer
private key WORM
- The public key, which can be known by - Is a small piece of program code that
everyone, is used to encrypt the data, attaches to the computer’s unused
and a private key is used to decode the memory space and replicates itself until
encrypted data. Knowing which public the system becomes overloaded and
encryption method a receiver uses shuts down.
enables the sender to use that public ANTIVIRUS SOFTWARE
key to encrypt the data, and the - To avoid destruction of data programs
receiver will use her private key to and to maintain operation of the IT
decode the data. system, an organization must employ
WEP antivirus software, which continually
- Wireless network equipment, such as scans the system for viruses and worms
access points and wireless network and either deletes or quarantines them.
cards, uses an encryption method called - Antivirus soft- ware renders virus and
wired equivalency privacy, or WEP. worm program code harmless.
MONITORING EXPOSURE - Develop, monitor, and review security
VULNERABILITY ASSESSMENT policies
- is the process of proactively examining
IT SYSTEMS THAT MUST BE SEGREGATED
the IT system for weaknesses that can
be exploited by hackers, viruses, or - Systems analysts analyze and design IT
malicious employees systems
INTRUSION DETECTION - Programmers actually write the
- systems are specific software tools that software, using a programming
monitor data flow within a network and language
alert the IT staff to hacking attempts or - Operation personnel are employees
other unauthorized access attempts who are responsible for processing
PENENTRATION TESTING operating data
- is the process of legitimately attempting - The database administrator develops
to hack into an IT system to find and maintains the database and
whether weaknesses can be exploited ensures adequate controls over data
by unauthorized hackers. within the database

3. Organizational structure PHYSICAL ENVIRONMENT & SECURITY


4. Physical environment and physical Physical security
security of the system
5. Business community - Is intended to limit physical access to
computer hardware and software so
that malicious acts or vandalism do not
MARCH 26 disrupt the system, and so that the data
is protected
ORGANIZATIONAL STRUCTURE
Location
IT GOVERNANCE COMMMITTEE
- A large IT system should be physically
- Made up of top executive located in an area and building that are
- Its function is to govern the overall least risk of natural disasters.
development and operation of IT - Natural disasters can easily destroy or
system disrupt IT system operations.
- Includes: CEO, CFO, CIO
Uninterruptible power supply (UPS)
RESPONSIBILITIES
- Includes a battery to maintain power in
- Align IT investments to business the event of a power outage in order to
strategy keep the computer running for several
- Budget funds and personnel for the minutes after a power outage.
most effective use of the IT systems
- Oversee and prioritize changes to IT Emergency power supply
systems - Is an alternative power supply that
- Develop, monitor, and review all IT provides electrical power in the event
operational policies that a main source is lost.
- Ex. Gasoline – powered generator
Physical controls - Whereas BCP is proactive planning, DRP
is a more reactive plan to restore
- Limited access to computer room
business operations to normal after a
through employee ID badges or card
disaster occurs
keys
- Video surveillance equipment General control from AICPA trust services
- Logs of persons entering and exiting the principle perspective
computer rooms
5 categories of IT controls and risk
- Locked storage of backup data and
offsite backup data Security
Business continuity plan (BCP) - The system is protected against
unauthorized (physical and logical)
- Is a proactive program for considering
access.
risks to the continuation of business
and developing plans and procedures to Availability
reduce those risks
- The system is available for operation
2 pats of BCP related to IT: and use as committed or agreed.
- A strategy for backup and restoration of Processing integrity
IT systems, to include redundant
servers, redundant data storage, daily - System processing is complete,
incremental backups, a backup of accurate, timely, and authoried
weekly changes, and off - site storage of Online privacy
daily and weekly backups
- A disaster recovery plan - Personal info obtained as a result of a e-
commerce is collected, used, disclosed
Redundant servers and retained as committed or agreed.
- 2 or more computer network/data Confidentiality
servers that can run identical process or
maintain the same data. - Information designated as confidential
- Accomplished by: is protected as committed or agreed
o Redundant arrays of Security risks
independent risk (RAIDs)- often
set up such that 2/more disks - While the most popular type of
are exact mirror images unauthorized access is probably by a
o This backup protection is person unknown to the organization,
improved by off-site backup, an employees of the organization also may
additional copy of the backup try to access data to which they do not
files stored in & off site need access to perform their job duties
location. Availability
Disaster recovery plan (DSP) - must be assessed and controlled by
- The plan for the continuance of IT authentication of user controls. Once a
systems after a disaster person gains unauthorized access, it is
conceivable that he may tamper with
the IT system in a manner that may shut
down systems and/or programs.

Processing integrity

- refers to the accuracy, completeness,


and timeliness of the processing in IT
systems. If unauthorized users access
the IT system, they could alter data to
change the results of processing

Confidentiality risk

- The risk of confidential data being


available to unauthorized users, can
occur if authentication controls are
weak.
- An unauthorized user who gains access
can browse, steal, or destroy
confidential data

You might also like