INF2004F Summary Notes.docx

In a private key system the sender and the receiver

Info icon This preview shows pages 17–19. Sign up to view the full content.

View Full Document Right Arrow Icon
In a private key system, the sender and the receiver have the same key, and in the public key system they have different keys Steps in creating a digital signature 1. The document creator uses a hashing algorithm to generate a hash of the original document 2. The document creator uses their private key to encrypt the hash created in step 1 3. The encrypted hash is a legally binding digital signature Steps in encryption Plaintext = original text With encryption key and algorithm Convert to ciphertext (encrypted text) Encryption key – convert ciphertext to plaintext Generally accepted privacy principles Management – clear procedures and policies, followed by responsibility and accountability Notice – notify about policies and practices before collection of data Choice and consent – opt-in vs opt-out (out-in -> visitors have to actively choose to receive more information, such as news, mails etc.) Collection – collect only needed information Use and retention – use information only for business purpose Access – customers should be able to review, correct or delete information from them Disclosure to third parties Security – prevent loss or unauthorised access Quality Monitoring and enforcement – respond to complaints & compliance Module 8: Processing Integrity and availability controls [chapter 10] Systems availability Minimise risk of server down & quickly recover and resume normal operations Availability controls: Disaster recovery plan (DRP) – procedures to recover IT function Business continuity plan (BCP) – resuming all operations (not just IT) Backup procedures General threats & threats during each step: General threats: Inaccurate or invalid general ledger data – misleading reports; wrong decisions made; liabilities might be arisen Unauthorised disclosure of financial statement Loss or destruction of data Threats during input: Debit amount of two digits when recording granting of new debt Threats during processing: Inaccurate adjusting entries made due to errors in source documents Threats during output:
Image of page 17

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Unauthorised employee access to confidential financial results Processing integrity (input, processing & output) Input controls: Good forms design (having pre-numbered documents) – minimise errors as documents are in sequence; would be easily known which document is missing- source documents are sequentially numbered Turnaround documents – more efficient & minimise errors- some info is already available for you, you complete it and send it back to company e.g. uct registration forms Processing controls: Data matching – data values must match and be consistent before being processed File labels – correct and most current file is updated Cross footing – calculate totals using multiple methods & ensure getting same results Data transmission controls – check sums & parity checks Output controls: Reconciliation -
Image of page 18
Image of page 19
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern