Get premium membership and access questions with answers, video lessons as well as revision papers.

Client/Server architecture, database technology and networks provide structures which facilitate sharing of corporate data and information.As an information Technology (IT) specialist, outline the major precautions...

      

Client/Server architecture, database technology and networks provide structures which
facilitate sharing of corporate data and information.
As an information Technology (IT) specialist, outline the major precautions that should be
taken into account in the process of sharing data.

  

Answers


gregory
Major precautions to be taken into account in the process of sharing data and information.
1. Logical access control to the system and data files
This refers to controlling those who have access to terminal of a computer from gaining
access to the data of software.
Logical access can be achieved through the use of passwords and software controls. They
ensure that:
i) Data stored in the database files is not corrupted by unauthorised users or lost.
ii) Unauthorised access of data is restricted thus maintaining data confidentiality and
integrity
iii) Data which is transmitted through the networks is not stolen during transmission by
unauthorised persons. This can be achieved through data encryption.
2. Physical access controls
These are controls which prevent unauthorised people from getting near the computer
equipment or the storage media. They ensure that they system is protected against
sabotage or access by unauthorised users. They can be achieved through:
i) Use of mechanical devices such as lock and keys to protect the system.
ii) Use of closed circuit cameras to identify unauthorised users.
iii) Use of electronic identification devices for users such as the card swipe systems.
iv) Location of the computer room to limit access to computer systems.
3. Safe data transmission techniques
These are techniques which ensure that data being transmitted via a network cannot be
accessed by unauthorised users. They include:
i) Data encryption: - This is a method of data transmission whereby data is transmitted in a
coded or encrypted form and for the recipient to be able to read it must be decoded.
ii) Parity checks: - These are controls that check the transfer of data as it is being
transferred from one system to another by use of a parity bit added to each byte.
4. File identification checks
This precaution is especially important in the client/server architecture method of data
processing. It ensures that correct files have been loaded for processing and that correct
labels are sued. This enhances the reliability of data.
5. Data transmission controls
These are controls on data which is being transmitted via a network link. They include:
i) Sampling of files and tracing them back to the original source documents.
ii) Establishing terminal check schedule for transmission.
iii) If transmission is batch oriented, the serial number of programs in each batch must
be examined.
iv) Use of data encryption and protocols.
6. Administrative controls
This include division of responsibilities, physical checks, environmental screening,
sociological influences of information technology system, selection of personnel back up
facilities etc.
gregorymasila answered the question on November 30, 2017 at 11:50


Next: Describe the relevance of the following to a Decision Support System (DSS):(i) Specialized packages: (ii) Query languages; (iii) Database management system
Previous: Explain what is meant by a Graphical User Interface (GUI) and account for the increased design and implementation of such interfaces

View More Computer Science Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions