Ad blocker interference detected!
Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers
Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.
This article discusses the resolution of security problems involving the use of microcomputers in business by: (I) identifying audit problems which arise; and (2) presenting management countermeasures. Microcomputer use carries risks in three major areas: (1) physical security of hardware; (2) physical security of data and software; and (3) data integrity.
Physical security of hardware involves common-sense methods to prevent theft or damage. Various methods in use to secure data and software include: (1) password protection; (2) data encryption/decryption; (3) copy protection; (4) audit trails; and (5) security controls on the microcomputer-mainframe link.
Maintaining current, accurate, and complete data requires: (1) standard hardware and software configuration within an organization; (2) data and program backup; (3) testing and documentation of computer models and user-written programs; and (4) use of current data only. Auditors should make use of available programming tools, such as cross-reference, file recovery, disk explorations, sort/merge, and file dump. A partial list of hardware and software available for microcomputers is included.