In: Accounting
3. Are the types of system controls that may be implemented effective at maintaining system security? Justify your answer. Answer that question in at least 300 words.
WHAT IS SYSTEM CONTROL?
Systems control, in a communications system, is the control and implementation of a set of functions that Is effective in maintaining the system security in the following ways:
1. prevent or eliminate degradation of any part of the system,
2. initiate immediate response to demands that are placed on the system,
3. respond to changes in the system to meet long range requirements, and
4. may include various subfunctions, such as
o immediate circuit utilization actions,
o continuous control of circuit quality,
o continuous control of equipment performance,
o development of procedures for immediate repair, restoration, or replacement of facilities and equipment,
o continuous liaison with system users and with representatives of other systems, and
o the provision of advice and assistance in system use.
WHAT IS SYSTEM SECURITY?
Computer systems face a number of security threats. One of the basic threats is data loss, which means that parts of a database can no longer be retrieved. This could be the result of physical damage to the storage medium (like fire or water damage), human error or hardware failures.
Another security threat is unauthorized access. Many computer systems contain sensitive information, and it could be very harmful if it were to fall in the wrong hands. Imagine someone getting a hold of your social security number, date of birth, address and bank information. Getting unauthorized access to computer systems is known as cracking.
You have heard the term hacker to refer to those nefarious folks who access systems illegally. But to a professional IT person, and in the IT field, a hacker is actually someone who is a very good programmer. On the other hand, someone who accesses systems illegally is actually carrying out cracking. Basically, they are trying to break (crack) things.
These individuals have developed sophisticated methods to obtain data from databases, which they may use for personal gain or to harm others.
A third category of security threats consists of viruses and other harmful programs. A computer virus is a computer program that can cause damage to a computer's software, hardware or data. It is referred to as a virus because it has the capability to replicate itself and hide inside other computer files.
The objective of system security is the protection of information and property from theft, corruption and other types of damage, while allowing the information and property to remain accessible and productive. System security includes the development and implementation of security countermeasures. There are a number of different approaches to computer system security, including the use of a firewall, data encryption, passwords and biometrics.
CONCLUSION: Yes system controls are very much effective in maintaining system security , for that we have to follow strict system protocols or the control guidelines stated above to effectively maintain system security.
Thorough justification of the answer given above. The system controls applied in a correct manner will give awful results for maintaining the system controls.