Get premium membership and access questions with answers, video lessons as well as revision papers.
(i) Administrative controls that need to be implemented:
1. USE OF COMPETENT PERSONNEL
This reduces the risk of data being lost or equipment being damaged due to
incompetence.
2. ROTATION AND DIVISION OF LABOUR
Network control functions should be separated and duties rotated on a regular basis.
Division of labour ensures that the network control is performed effectively.
Rotation of duties reduces the risk of sabotage by staff members since such an
attempt would require that the staff member be in charge of the given duties for a
considerable period of time.
3. AUDIT TRAIL REVIEW
Audit trails should be reviewed periodically by operations management to detect any
unauthorized network operation activities.
4. DOCUMENTATION AND REVIEW OF STANDARDS
Network operation standards and protocols should be documented and made
available to the operators and should be reviewed periodically to ensure compliance.
5. MONITORING
Network access should be closely monitored and reviewed by system engineers to
detect unauthorized access.
(ii) Techniques used to secure e-mail messages:
1. DATA ENCRYPTION
The e-mail messages could be encrypted (converted into a coded form) by a code before
being sent. At the receiver‘s end, the messages are decrypted before being read. This
technique would prevent eavesdropping.
2. DIGITAL SIGNATURES
This works together with the principle of data encryption to guarantee authenticity of e-
mail messages and thus avoid falsified sender‘s identities. The sender adds a digital
signature to the message being sent. A digital signature is issued by certificate authorities
which certify the credibility of an individual communicating over the Internet. Digital
signatures thus provide assurance that the sender of a message is really who he claims to
be.
o Policy issues
Antivirus software should be installed on all the computers on the network to detect
and cleanout viruses.
Floppy disk drives could be disabled to reduce the risk of viruses being brought to the
computer through diskettes.
Have vendors run demonstrations on their machines and not the company‘s machines.
Allow no disk to be used until it has been scanned on a stand-alone machine that is
used for no other purpose and is not connected to your network.
Update virus software scanning definitions frequently.
Write protect all diskettes with .EXE or .COM extensions.
Enforce a rule of not using software without first scanning the shareware thoroughly
for a virus.
Scan any new commercial software before it is installed since commercial software is
occasionally supplied with a Trojan horse.
Create a special master boot record that makes the hard disk inaccessible when booting
from a diskette or CD-ROM. This ensures that the diskette or optical media cannot
contaminate the hard disk.
gregorymasila answered the question on November 22, 2017 at 10:44
- On coming back from a fact finding mission about a company in need of automating its sales department, your supervisor hands over a report to...(Solved)
On coming back from a fact finding mission about a company in need of automating its sales department, your supervisor hands over a report to you for analysis. Since you are on internship in the Firm, you are only required to comment your ideas for consideration before they can be approved for implementation.
Required:
(i) Explain what is meant by systems analysis.
(ii) Outline four main objectives of systems analysis.
(iii) State some of the personnel who work in the information systems and their
tasks in the analysis phase
Date posted: November 22, 2017. Answers (1)
- What are the advantages of using a data transmission communications network?(Solved)
What are the advantages of using a data transmission communications network?
Date posted: November 21, 2017. Answers (1)
- Outline factors to be considered while selecting data transmission system.(Solved)
Outline factors to be considered while selecting data transmission system.
Date posted: November 21, 2017. Answers (1)
- Outline the advantages and disadvantages of computer output on microfilm(COM)(Solved)
Outline the advantages and disadvantages of computer output on microfilm(COM)
Date posted: November 21, 2017. Answers (1)
- State the types of high speed printers.(Solved)
State the types of high speed printers.
Date posted: November 21, 2017. Answers (1)
- State the types of low speed printers.(Solved)
State the types of low speed printers.
Date posted: November 21, 2017. Answers (1)
- State and explain characteristics a good code in computer system.(Solved)
State and explain characteristics a good code in computer system.
Date posted: November 21, 2017. Answers (1)
- State and explain factors to consider when selecting an input device/facility for a computer system.(Solved)
State and explain factors to consider when selecting an input facility for a computer system.
Date posted: November 21, 2017. Answers (1)
- State examples of input devices.(Solved)
State examples of input devices.
Date posted: November 21, 2017. Answers (1)
- Outline the advantages of Optical Character Reader.(Solved)
Outline the advantages of Optical Character Reader.
Date posted: November 21, 2017. Answers (1)
- Name and explain three tasks that the systems analyst would undertake in the design phase of information systems development process.(Solved)
Name and explain three tasks that the systems analyst would undertake in the design
phase of information systems development process.
Date posted: November 21, 2017. Answers (1)
- Explain why Local Area Networks (LANs) have been successful in improving the flow of data and information in organisations(Solved)
Explain why Local Area Networks (LANs) have been successful in improving the flow of data and information in organisations.
Date posted: November 21, 2017. Answers (1)
- Decision support systems (DSS) help to fulfil management's requirements for computerized information systems by assisting them in complex and unstructured tasks.Required:Describe the relevance and uses...(Solved)
Decision support systems (DSS) help to fulfill management's requirements for computerized information systems by assisting them in complex and unstructured tasks.
Required:
Describe the relevance and uses of a DSS to management accountants.
Date posted: November 21, 2017. Answers (1)
- Why do organisations automate reasoning or decision making tasks which human beings are naturally better able to perform than computers?(Solved)
Why do organisations automate reasoning or decision making tasks which human beings are naturally better able to perform than computers?
Date posted: November 21, 2017. Answers (1)
- State six ways in which a business can use Desktop Publishing (DTP).(Solved)
State six ways in which a business can use Desktop Publishing (DTP).
Date posted: November 21, 2017. Answers (1)
- Your managing director is in two minds about establishing a company website and has asked you to produce a "balanced report" on the pros and...(Solved)
Your managing director is in two minds about establishing a company website and has asked you to produce a "balanced report" on the pros and cons. You have already written several pages on the benefits and you have just started on a section headed "Anxieties".
What sub-headings might this section include?
Date posted: November 21, 2017. Answers (1)
- Risks to data are relevant to manual as well as computerised systems. With computerized systems however", the risks are greater, because data are held on...(Solved)
Risks to data are relevant to manual as well as computerized systems. With computerized systems however", the risks are greater, because data are held on magnetic files and cannot be seen or read by the human eye.
What risks are particularly relevant to data storage on a magnetic medium?
Date posted: November 21, 2017. Answers (1)
- It is important to bear in mind that information may be relevant to people outside the organisation as well as to its internal management and employees....(Solved)
It is important to bear in mind that information may be relevant to people outside the organisation as well as to its internal management and employees. Sometimes it happens that some decisions relating to an organisation are taken by outsiders.
State six examples of decisions relating to an organisation that may be taken by outsiders
Date posted: November 21, 2017. Answers (1)
- The adoption of database systems as a way of managing information systems is gaining popularity over standard file: Required:(i) State the features of a database management...(Solved)
The adoption of database systems as a way of managing information systems is gaining
popularity over standard file.
Required:
(i) State the features of a database management system that provide data security and
integrity.
(ii) What problems are caused by data redundancies?
(iii) Centralized control avoids unnecessary data redundancy or duplication.
What precautions should be taken into account -in the process of establishing a
centralized data control system to avoid data redundancy?
Date posted: November 21, 2017. Answers (1)
- Using your own experience, explain why more and more software is being purchased for windows environment as opposed to character based environment(Solved)
Using your own experience, explain why more and more software is being purchased for windows environment as opposed to character based environment.
Date posted: November 21, 2017. Answers (1)