Question

In: Accounting

3. Are the types of system controls that may be implemented effective at maintaining system security?...

3. Are the types of system controls that may be implemented effective at maintaining system security? Justify your answer. Answer that question in at least 300 words.

Solutions

Expert Solution

WHAT IS SYSTEM CONTROL?

Systems control, in a communications system, is the control and implementation of a set of functions that Is effective in maintaining the system security in the following ways:

1. prevent or eliminate degradation of any part of the system,

2. initiate immediate response to demands that are placed on the system,

3. respond to changes in the system to meet long range requirements, and

4. may include various subfunctions, such as

o immediate circuit utilization actions,

o continuous control of circuit quality,

o continuous control of equipment performance,

o development of procedures for immediate repair, restoration, or replacement of facilities and equipment,

o continuous liaison with system users and with representatives of other systems, and

o the provision of advice and assistance in system use.

WHAT IS SYSTEM SECURITY?

Computer systems face a number of security threats. One of the basic threats is data loss, which means that parts of a database can no longer be retrieved. This could be the result of physical damage to the storage medium (like fire or water damage), human error or hardware failures.

Another security threat is unauthorized access. Many computer systems contain sensitive information, and it could be very harmful if it were to fall in the wrong hands. Imagine someone getting a hold of your social security number, date of birth, address and bank information. Getting unauthorized access to computer systems is known as cracking.

You have heard the term hacker to refer to those nefarious folks who access systems illegally. But to a professional IT person, and in the IT field, a hacker is actually someone who is a very good programmer. On the other hand, someone who accesses systems illegally is actually carrying out cracking. Basically, they are trying to break (crack) things.

These individuals have developed sophisticated methods to obtain data from databases, which they may use for personal gain or to harm others.

A third category of security threats consists of viruses and other harmful programs. A computer virus is a computer program that can cause damage to a computer's software, hardware or data. It is referred to as a virus because it has the capability to replicate itself and hide inside other computer files.

The objective of system security is the protection of information and property from theft, corruption and other types of damage, while allowing the information and property to remain accessible and productive. System security includes the development and implementation of security countermeasures. There are a number of different approaches to computer system security, including the use of a firewall, data encryption, passwords and biometrics.

CONCLUSION: Yes system controls are very much effective in maintaining system security , for that we have to follow strict system protocols or the control guidelines stated above to effectively maintain system security.

Thorough justification of the answer given above. The system controls applied in a correct manner will give awful results for maintaining the system controls.


Related Solutions

Accreditation is the evaluation of the security controls of an IT system to establish the extent...
Accreditation is the evaluation of the security controls of an IT system to establish the extent to which a particular design and implementation meets a set of specified security requirements. The risk management strategy used for A&A is depicted in the document, Risk Management Framework. Select ONE of the six steps of the framework illustrated in the Risk Management Framework. In at least 250 words, discuss the following: Identify the step and associated government document. Discuss the importance of the...
Accreditation is the evaluation of the security controls of an IT system to establish the extent...
Accreditation is the evaluation of the security controls of an IT system to establish the extent to which a particular design and implementation meets a set of specified security requirements. The risk management strategy used for A&A is depicted in the document, Risk Management Framework. Select Three of the six steps of the framework illustrated in the Risk Management Framework below: STEPS: 1: Categorize Information System 2: Implement Security Controls 3: Assess Security Controls 4: Select Security Controls 5: Authorize...
I am creating a system for a security design and need to choose controls for network...
I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.
Who is responsible for maintaining controls concerning: (1) Monitoring (2) Information and Communications (3) Information Technology...
Who is responsible for maintaining controls concerning: (1) Monitoring (2) Information and Communications (3) Information Technology (IT) (4) Transaction approval (5) Enterprise Risk Management (ERM)
[Auditing] 3. Which of the following controls would be most effective in detecting a misstatement of...
[Auditing] 3. Which of the following controls would be most effective in detecting a misstatement of the completeness assertion with respect to accounts payable? a. A list of outstanding checks written to vendors is generated during the preparation of the monthly bank reconciliation. b. Purchase orders must be accompanied by properly approved purchase requisitions before they are submitted to vendors. c. The AIS purchases and disbursements application will not prepare a check to a supplier without a valid ID number...
Describe the types of policies the federal government may have implemented to restore aggregate demand and...
Describe the types of policies the federal government may have implemented to restore aggregate demand and the potential obstacles policymakers may have encountered.
With respect to the Xero accounting information system, select three (3) controls in the system. With...
With respect to the Xero accounting information system, select three (3) controls in the system. With respect to each of these controls: a. Identify the control and the type of control. b. Explain what the control aims to prevent, detect or correct. Page | 2 c. Explain the operation of the control (i.e. how the control works). d. Evaluate the effectiveness of the control (i.e. whether, in your opinion, the control achieves its aims and why)
Why is it important to adopt a cost-effective risk management controls controls
Why is it important to adopt a cost-effective risk management controls controls
1) Security & E-Business List 5 different types of security issues that may confront a Small...
1) Security & E-Business List 5 different types of security issues that may confront a Small Business Enterprises (not all are internet based). Discuss some proactive security solutions. Include an actual example. Explain the recent legislation change in regards to hacking of SBE’s that meet specific conditions. 2) Budgeting for Labour Commitments List and discuss some of the employee and payroll issues that may challenge a SBE. Select an actual example for one of these issues and discuss it in...
What are the 3 primary types of controls and what would be a good example of...
What are the 3 primary types of controls and what would be a good example of each control? Also, do you have examples of any of these controls from your organizations or do you have suggestions that you would like to see implemented in your organization?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT