14 - Advanced CIS.pdf - Introduction Advanced CIS Computers \u00a9 2014 Edge Business School a South African company All rights reserv ed This presentation

14 - Advanced CIS.pdf - Introduction Advanced CIS Computers...

This preview shows page 1 - 3 out of 19 pages.

© 2014 Edge Business School , a South African company. All rights reserved. This presentation is protected by copyright. Advanced CIS Computers © 2014 Edge Business School , a South African company. All rights reserved. This presentation is protected by copyright. Introduction Trends in IT Stand alone personal computers On-line computer systems Networks Database Electronic messaging systems Internet Bureauxs Viruses Computerised working paper programs © 2014 Edge Business School , a South African company. All rights reserved. This presentation is protected by copyright. Trends in IT Advanced CIS © 2014 Edge Business School , a South African company. All rights reserved. This presentation is protected by copyright. Trends in IT Mainframes to personal computers Increases in processing power and storage capacity Segregation of duties and confidentiality of information threatened Client / server systems architecture Local area networks to share information Scattering of operating systems, application systems and databases Open systems Common standards among manufacturers and developers around hardware and software – greater ease of access to all information Image processing Increased reliance of backing up electronic information to prevent loss of audit trails (EG scanned images)
Image of page 1
© 2014 Edge Business School , a South African company. All rights reserved. This presentation is protected by copyright. Trends in IT cont. CDs / DVDs / USBs Facilitate sharing and storing of information Security threats Smartcards Identification and authentication procedures Improvements to access controls (EG biometrics) Communications technology EFT, Internet, wireless communication Web enabled Access information from remote locations through the internet Cloud computing Store data on the internet © 2014 Edge Business School , a South African company. All rights reserved. This presentation is protected by copyright. Stand alone personal computers Advanced CIS © 2014 Edge Business School , a South African company. All rights reserved. This presentation is protected by copyright. Stand alone personal computers Stand alone computers are those systems in which users (such as the accounting department) control the hardware, software and operations of the system. The systems are usually physically located within the accounting department (for example) All members of the department have access to them © 2014 Edge Business School , a South African company. All rights reserved. This presentation is protected by copyright. Stand alone personal computers Security and control procedures A typical PC environment is less structured than a large centrally controlled IT environment Typically - users with limited computer skills manage the computer applications & disregard controls It is therefore NB to implement appropriate control procedures to improve the overall level of internal control, such as : Management authorization for use of personal computers (policies
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 19 pages?

  • Spring '19
  • Edge Business School

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask 0 bonus questions You can ask 15 questions (10 expire soon) You can ask 15 questions (will expire )
Answers in as fast as 15 minutes