Major precautions to be taken into account in the process of sharing data and information.
1. Logical access control to the system and data files
This refers to controlling those who have access to terminal of a computer from gaining
access to the data of software.
Logical access can be achieved through the use of passwords and software controls. They
ensure that:
i) Data stored in the database files is not corrupted by unauthorised users or lost.
ii) Unauthorised access of data is restricted thus maintaining data confidentiality and
integrity
iii) Data which is transmitted through the networks is not stolen during transmission by
unauthorised persons. This can be achieved through data encryption.
2. Physical access controls
These are controls which prevent unauthorised people from getting near the computer
equipment or the storage media. They ensure that they system is protected against
sabotage or access by unauthorised users. They can be achieved through:
i) Use of mechanical devices such as lock and keys to protect the system.
ii) Use of closed circuit cameras to identify unauthorised users.
iii) Use of electronic identification devices for users such as the card swipe systems.
iv) Location of the computer room to limit access to computer systems.
3. Safe data transmission techniques
These are techniques which ensure that data being transmitted via a network cannot be
accessed by unauthorised users. They include:
i) Data encryption: - This is a method of data transmission whereby data is transmitted in a
coded or encrypted form and for the recipient to be able to read it must be decoded.
ii) Parity checks: - These are controls that check the transfer of data as it is being
transferred from one system to another by use of a parity bit added to each byte.
4. File identification checks
This precaution is especially important in the client/server architecture method of data
processing. It ensures that correct files have been loaded for processing and that correct
labels are sued. This enhances the reliability of data.
5. Data transmission controls
These are controls on data which is being transmitted via a network link. They include:
i) Sampling of files and tracing them back to the original source documents.
ii) Establishing terminal check schedule for transmission.
iii) If transmission is batch oriented, the serial number of programs in each batch must
be examined.
iv) Use of data encryption and protocols.
6. Administrative controls
This include division of responsibilities, physical checks, environmental screening,
sociological influences of information technology system, selection of personnel back up
facilities etc.
gregorymasila answered the question on November 30, 2017 at 11:50
- Describe the relevance of the following to a Decision Support System (DSS):(i) Specialized packages: (ii) Query languages; (iii) Database management system(Solved)
Describe the relevance of the following to a Decision Support System (DSS):
(i) Specialized packages;
(ii) Query languages;
(iii) Database management system
Date posted: November 30, 2017. Answers (1)
- Management Information Systems should facilitate decision-making at all levels of management. Each level requires information with different characteristics and with differing degree of profitability.(Solved)
Management Information Systems should facilitate decision-making at all levels of management.
Each level requires information with different characteristics and with differing degree of
profitability.
Required:
a) Examine the characteristics of information used in (i) strategic planning and (ii) operational
control.
Date posted: November 30, 2017. Answers (1)
- Business process re-engineering (BPR) is the fundamental rethinking and radical redesign of business process to achieve a dramatic improvement in measures of performance such as...(Solved)
Business process re-engineering (BPR) is the fundamental rethinking and radical redesign of
business process to achieve a dramatic improvement in measures of performance such as
quality, cost, speed and services.
Required:
i) List the steps of BPR.
ii) Critically examine the role information technology (IT) plays in BPR
Date posted: November 30, 2017. Answers (1)
- The general manager of a large organisation has asked you to draw up a document identifying eight important system characteristics against which managers can evaluate...(Solved)
The general manager of a large organisation has asked you to draw up a document
identifying eight important system characteristics against which managers can evaluate the
success of an information system together with a brief explanation of each. What would
your document contain?
Date posted: November 30, 2017. Answers (1)
- Selling of products, services and information via the computer networks including the internet.Required: (a) Brief explanation of the following concepts as relates to e-commerce: (i) Electronic market....(Solved)
Selling of products, services and information via the computer networks including the internet.
Required:
a) Brief explanation of the following concepts as relates to e-commerce:
i) Electronic market.
ii) Electronic purse.
iii) Cyber banking.
iv) Cyber mall.
Date posted: November 30, 2017. Answers (1)
- Most systems are obsolescent the day they become operational. Comment on this statement giving six key reasons why changes to a system are so often...(Solved)
Most systems are obsolescent the day they become operational. Comment on this statement giving six key reasons why changes to a system are so often necessary after it has been implemented.
Date posted: November 29, 2017. Answers (1)
- Describe the functional characteristics and applicability of the backing store(Solved)
Describe the functional characteristics and applicability of the backing store.
Date posted: November 29, 2017. Answers (1)
- Give and explain two reasons, in each circumstance why the boot-up programs are stored. (i) In ROM (ii) On Disk(Solved)
Give and explain two reasons, in each circumstance why the boot-up programs are stored.
i) In ROM
ii) On Disk
Date posted: November 29, 2017. Answers (1)
- Access control is the restriction of unauthorized access to a portion of a computer system or the entire system.Required: (a) Explain the following control techniques and...(Solved)
Access control is the restriction of unauthorised access to a portion of a computer system or the
entire system.
Required:
a) Explain the following control techniques and their significance in the context of data security.
i) Biometric control
ii) Encryption
iii) Logical access
Date posted: November 29, 2017. Answers (1)
- Application controls can be classified into three major categories, processing controls and output controls. Describe the objective of each control and examine the techniques within...(Solved)
Application controls can be classified into three major categories, processing controls and
output controls.
Describe the objective of each control and examine the techniques within each to ensure
maintenance of maximum feasible levels of control.
Date posted: November 29, 2017. Answers (1)
- Explain how the use of Information Technology (IT) can bring about improvements in productivity within a business organisation(Solved)
Explain how the use of Information Technology (IT) can bring about improvements in productivity within a business organisation.
Date posted: November 29, 2017. Answers (1)
- Prototyping is based on the simple idea that people can express more easily what they like or do not like about an actual working system(Solved)
Prototyping is based on the simple idea that people can express more easily what they like or
do not like about an actual working system.
Required:
(a)
(i) Examine four guidelines required for the development of a prototype.
(ii) Select two facilities usually found in fourth generation languages (4GLs) and explain their
application in developing a prototype system.
Date posted: November 29, 2017. Answers (1)
- Organisation information systems are categorised under: (i) Transaction Processing System (TPS)(Solved)
Organisation information systems are categorised under:
i) Transaction Processing System (TPS)
ii) Management Information Systems (MIS)
iii) Decision Support System (DSS)
iv) Executive Information System (EIS)
v) Expert Systems (ES)
Required:
Suggest one application of each of the systems types listed above for each of the following
functional areas of business:
- Sales and marketing
- Finance
Date posted: November 29, 2017. Answers (1)
- What impact might end-user computing have on the organisation of information technology functions?(Solved)
What impact might end-user computing have on the organisation of information technology functions?
Date posted: November 29, 2017. Answers (1)
- Suggest examples of activities end-users might not be responsible for.(Solved)
Suggest examples of activities end-users might not be responsible for.
Date posted: November 29, 2017. Answers (1)
- The following are some of the elements which constitute an E-Commerce application: -Automated Teller Machine (ATM ), Electronic Data Interchange (EDI), Internet. Required:Illustrate the contributions of...(Solved)
The following are some of the elements which constitute an E-Commerce application: -
Automated Teller Machine (ATM )
Electronic Data Interchange (EDI)
Internet.
Required:
Illustrate the contributions of each of the above technologies in E-Commerce application.
Date posted: November 29, 2017. Answers (1)
- Explain the meaning of the following terms: (i) Website. (ii) Cyber-cafe (iii) Network browser(Solved)
Explain the meaning of the following terms:
i. Website.
ii. Cyber-cafe.
iii. Network browser.
Date posted: November 29, 2017. Answers (1)
- During the design stage of a new information system, the following issues are addressed: (i) User interface (ii) Data (iii)Process. Required:Discuss the composition of design document under the...(Solved)
During the design stage of a new information system, the following issues are addressed:
(i) User interface.
(ii) Data.
(iii) Process.
Required:
Discuss the composition of design document under the above three elements.
Date posted: November 29, 2017. Answers (1)
- Briefly describe any four computer related crimes that an organisation which is considering computerising its operations should be aware of(Solved)
Briefly describe any four computer related crimes that an organisation which is considering computerising its operations should be aware of.
Date posted: November 29, 2017. Answers (1)
- Explain the term 'critical path' as used in project management(Solved)
Explain the term 'critical' path as used in project management.
Date posted: November 29, 2017. Answers (1)