
Paper F1: Accountant in business
222 Go to www.emilewoolfpublishing.com for Q/As, Notes & Study Guides © EWP
physical protection for cables (to provide protection against fire and floods)
back-up power generators, in the event of a loss of power supply
using shatter-proof glass for windows where the computer is located
installing smoke detectors, fire alarms and fire doors
regular fire drills, so that staff know what measures to take to protect data and
files in the event of a fire
obtaining insurance cover against losses in the event of a fire or flooding.
Note that in some organisations, risk measures have also been taken to counter the
risk to computer systems from terrorist attack, and ensure that the computer system
will continue to operate even if there is a damaging attack. For example, two
companies might agree to allow the other to use its mainframe systems to operate
key computer systems, in the event that one of them suffers the destruction of its
system in a terrorist attack.
Passwords
A computer password is defined as ‘a sequence of characters that must be presented
to a computer system before it will allow access to the systems or parts of a system’
(British Computer Society definition).
Typically, a computer user is given a prompt on the computer screen to enter his
password. Access to the computer system is only permitted if the user enters the
correct password.
Passwords can also be placed on individual computer files, as well as systems and
programs.
To gain access to a system, it may be necessary to input both a user name and a
password for the user name. For example, a manager wanting to access his e-mails
from a remote location may need to input both a user name and the password for
the user name.
However, password systems are not always as secure as they ought to be, mainly
due to human error. Problems of password systems include the following:
Users might give their passwords to other individuals who are not authorised to
access the system.
Users are often predictable in their choice of passwords, so that a hacker might
be able to guess, by trial and error, a password to gain entry to a system or
program or file. (Typically, users often select a password they can remember,
such as the name of their father or mother, or the month of their birth).
Passwords are often written down so that the user will not forget it. Copied
passwords might be seen, and used, by an unauthorised person.
Passwords should be changed regularly, but often-poor password control
management means that passwords go unchanged for a long time.