INF2004F Summary Notes.docx

In a private key system the sender and the receiver

Info icon This preview shows pages 17–19. Sign up to view the full content.

In a private key system, the sender and the receiver have the same key, and in the public key system they have different keys Steps in creating a digital signature 1. The document creator uses a hashing algorithm to generate a hash of the original document 2. The document creator uses their private key to encrypt the hash created in step 1 3. The encrypted hash is a legally binding digital signature Steps in encryption Plaintext = original text With encryption key and algorithm Convert to ciphertext (encrypted text) Encryption key – convert ciphertext to plaintext Generally accepted privacy principles Management – clear procedures and policies, followed by responsibility and accountability Notice – notify about policies and practices before collection of data Choice and consent – opt-in vs opt-out (out-in -> visitors have to actively choose to receive more information, such as news, mails etc.) Collection – collect only needed information Use and retention – use information only for business purpose Access – customers should be able to review, correct or delete information from them Disclosure to third parties Security – prevent loss or unauthorised access Quality Monitoring and enforcement – respond to complaints & compliance Module 8: Processing Integrity and availability controls [chapter 10] Systems availability Minimise risk of server down & quickly recover and resume normal operations Availability controls: Disaster recovery plan (DRP) – procedures to recover IT function Business continuity plan (BCP) – resuming all operations (not just IT) Backup procedures General threats & threats during each step: General threats: Inaccurate or invalid general ledger data – misleading reports; wrong decisions made; liabilities might be arisen Unauthorised disclosure of financial statement Loss or destruction of data Threats during input: Debit amount of two digits when recording granting of new debt Threats during processing: Inaccurate adjusting entries made due to errors in source documents Threats during output:
Image of page 17

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Unauthorised employee access to confidential financial results Processing integrity (input, processing & output) Input controls: Good forms design (having pre-numbered documents) – minimise errors as documents are in sequence; would be easily known which document is missing- source documents are sequentially numbered Turnaround documents – more efficient & minimise errors- some info is already available for you, you complete it and send it back to company e.g. uct registration forms Processing controls: Data matching – data values must match and be consistent before being processed File labels – correct and most current file is updated Cross footing – calculate totals using multiple methods & ensure getting same results Data transmission controls – check sums & parity checks Output controls: Reconciliation -
Image of page 18
Image of page 19
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern