Preview

Input Controls

Better Essays
Open Document
Open Document
1029 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Input Controls
Input Controls

Pamela D. Thompson

Professor Nolyn Johnson

May 19, 2013

Abstract This paper will discuss input controls and their various functions. An input control includes the necessary measures to ensure that data is correct, complete, and secure (Shelly & Rosenblatt, 2012). Input controls as it relate to user interface, includes audit trails, password security, data security, and encryption (Shelly & Rosenblatt, 2012). It is vital a company should take all needed measures to protect its data, which include customer, employees, and suppliers. Most assets have a value, but corporate data is priceless, because without safe, secure, accurate data, a company cannot function. (Shelly & Rosenblatt, 2012).

Input Controls Audit trail keeps a record of every piece of data item and when it entered the system. In addition to recording the original the source, an audit trail must show how and when data is accessed or changed, and by whom (Shelly & Rosenblatt, 2012). Companies will benefit having an audit trail as it provide documentation of all documents received and pass between departments. The following will give examples of audit trails input controls: * Individual Accountability * Reconstructing Events * Problem Monitoring * Intrusion Detection
Individual Accountability: the user is monitored and is personally accountable for their use on a companies’ computer. This deters the user form circumventing security policies (Goplakrishm, 2013). The user will be held accountable if security policies have been breached.
Reconstructing Events: an event can be reconstructed after a problem has occurred. The amount of damage that occurred with an incident can be assessed by reviewing audit trails of system activity to pinpoint how, when, and why the incident occurred (Goplakrishm, 2013).
Problem Monitoring: a tool used to monitor problems on-line as they occur. Such real time monitoring helps in detection of problem like



Cited: Abdulhayohlu, M. (1998, UNK UNK). Instant SSL by COMODO. Retrieved from Instant SSL by COMODO: http://www.comodo.com Contributor, G. (2006, June 13). TechRepublic. Retrieved from TechRepublic: http://www.techrepublic.com Goplakrishm, R. (2013, 5 17). Audit Trails. Retrieved from Audit Trails: http://www.homes.cerias.purdue.edu Shelly, G. B., & Rosenblatt, H. J. (2012). User Interface Design. In G. B. Shelly, H. J. Rosenblatt, M. Staudt, & M. Stranz (Eds.), Systems Analysis and Design (Vol. 9th, p. 371). Mason, Ohio: Cengag Learning. Sivathanu, G., Wright, C. P., & Zadok, E. (2005, November 14). Stony Brook University. Retrieved from Ensuring Data Integrity in Storage: Techniques and Applications: http://www.fsl.cs.sunysb.edu/docs/integrity-storagess05/integrity.html

You May Also Find These Documents Helpful

  • Good Essays

    It302-Unit4

    • 648 Words
    • 3 Pages

    References: Heim, S. (2007). The Resonant Interface: HCI Foundations for Interaction Design: Addison-Wesley. Pearson Education, Inc…

    • 648 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    • Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics)…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A few different types of security events and baseline anomalies that might indicate suspicious activity…

    • 563 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    RTT1 Task 2

    • 3259 Words
    • 10 Pages

    the problem. Once the root problem(s) is found the team comes up with solution(s) to help the…

    • 3259 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Lab 4

    • 581 Words
    • 2 Pages

    Loss of Integrity – Impact if system or data integrity is lost by unauthorized changes to the data or system.…

    • 581 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Root Cause Analysis – identifying the areas (and their potential impact) that are affected by a defect or by a certain functionality.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Study guide exam 2

    • 649 Words
    • 4 Pages

    Compensating controls for security, program development/modification, source data and data entry, processing, and file library…

    • 649 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing the enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well the concepts for protecting the hardware and software assets of the enterprise.…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Internal controls are an essential asset to any company that wishes to maintain their company’s security and accuracy. These controls help to protect the assets belonging to a company from unforeseen events such as employee theft, robbery, or any sort of unauthorized use (Weygandt, Kimmel, & Kieso, 2008). They also create the opportunity for accounting records to be more accurate and reliable by limiting the possibility for errors and irregularities (Weygandt, Kimmel, & Kieso, 2008). An independent internal verification that is provided via internal controls maximizes the benefits of this system (Weygandt, Kimmel, & Kieso, 2008). There should be physical, mechanical, and electronic controls so that when jobs are segregated, there are more than one opportunities for a final verification of accuracy (Weygandt, Kimmel, & Kieso, 2008).…

    • 799 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Evidence Collection Policy

    • 2535 Words
    • 10 Pages

    Information Systems and Computing is responsible for the operation of Penn’s data networks (PennNet) as well as the establishment of information security policies, guidelines, and standards. The Office of Audit, Compliance and Privacy has authority to develop and oversee policies and procedures regarding the privacy of personal information. These offices therefore have the authority and responsibility to specify security incident response requirements to protect those networks as well as University data contained on those networks.…

    • 2535 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Input Control

    • 1095 Words
    • 5 Pages

    Shelly, G. B., & Rosenblatt, H. J. (2012). System Analysis and Design. Mason: Cengage Learning.…

    • 1095 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Security Monitoring

    • 867 Words
    • 4 Pages

    For an organization to truly have an secure system they must determine an list of risk. Businesses and organizations can use security monitoring to ensure both integrity and confidentiality for sensitive information. As well as holding IT administrators responsible for keeping their organizations sensitive and financial assets safe and secure from unwanted eyes.…

    • 867 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Understand the aspects of disaster recovery Disaster recovery is concerned with the recovery of critical systems in the event of a loss. Be able to discuss the process of recovering a system in the event of a failure A system recovery usually involves restoring the base operating systems, applications, and data files. Be able to discuss the types of alternative sites available for disaster recovery. The three types of sites available for disaster recovery are hot sites, warm sites, and cold sites. Be able to describe the needed components of an incident response policy the incident response policy explains how incidents will be handled, including notification, resources, and escalation. Full Backup A full backup is a complete,…

    • 1817 Words
    • 8 Pages
    Better Essays