The paper "Computer Security and Risk Awareness" is a good example of a finance and accounting assignment. These days, many organizations have adopted the use of computer for storing information and as means of communication. For example, the use of electronic mails. This method is very effective as it is more efficient and secure. Due to the increased use of computer in the communication and storage of information, there has been a need to protect this information from other users who might interfere with the content. Therefore, when designing a computer system in an organization a security system should be well chosen for the safety of sensitive information in the organization.
Nowadays this has not been a major problem due to the advancement of security systems that have been very effective in data protection. They range from; Use of passwords- this hinders anyone from accessing the computer apart from the authorized user who can use their password to log in. This is a common method to many systems and helps to ensure that no one uses the computer without the consent of the authorized user.
So, files kept in the computer system are not at risk of being altered or deleted. Some records should be made to be' read only' such that people who access them accidentally cannot make any changes to them. This can be enhanced by also putting a password on such files such that anyone who wants to view their content has to use the password to be allowed access to them. Some organizations that deal with very sensitive information such as the military and the FBI should also use more advanced means of data protection.
This can be achieved by incorporating other extra methods of data security. This can be through the use of encryption. This method enhances the content of the files such that anyone who accesses them will not be able to interpret their meaning. They can also make use of the audit trail system, which helps in analysing the history of all the actions performed in the system and will help to know when the information in the computer is being altered unofficially. In a more advanced system, for example, those connected to the internet hacker- monitored system should be adapted to detect when information in the system is been tapped.
Edward, W. (2006): Information Risk and Security, London, Gower publishing ltd.
Hugh, A. (2001): Computer and Intellectual Crime, Cambridge, BNA books.
John, P. (2000): Computer Security Management, London, Institute of career research.
Maritta, H. (2004): Computer Safety, Reliability and Security, New York, Springer
Matt, B. (2002): Computer Security, New York, Addison Wesley.
William, E (1999): Computer Control and Security, New York, J. Wiley