PART ONE
The online services make many risks much higher. When it comes to security issue especially for the starters, it is both physical and intangible information that have to be of great concern. Otherwise, you will face the risk of hardware thefts as well as hack into your services. Regarding the availability in this scenario, we are considering the available services for the clients and that it offers the required necessities for the customers. Therefore, if customers are in need of some goods online, then the website should be in a working condition, and it should have adequate information concerning the products. Lastly, there is a privacy risk. It is quite similar to security risk in the sense that if someone hacks the software, then the privacy of the customers are compromised where their names, addresses, and credit cards may be stolen.
Question two
The most appropriate technique of preventing physical security is to keep the hardware out of sight from the clients (Stair & Reynolds, 2010). However, when it comes to hacking, the best method is the application of firewalls and passwords to provide protection to the system. Maintenance should be the key for the availability risk. That is software should be inspected and updated regularly to limit errors; hence, solving issues at a faster rate. The same protection procedures also apply to privacy risks. Since hacking has become a common risk for businesses, then ensure that your software has the right setting to prevent intruders accessing the data.
Question three
The website of the store has several features that classify the type of clothing to allow the customers view the items of different colors. Therefore, to buy an item, the users will only click on the icon that depicts the desired product then adds it to the individual shopping basket. Moreover, the clients are capable of viewing the basket as they make a purchase at any time while browsing the site. Therefore, when checking out at the site, new clients have to register by providing billing, shopping, and credit card records. It will then return the login of the customers with the identification code, and the created password created during registration. It also uses the similar record to confirm the status of the order. In the event where the customer forgets their login information, they are expected to click on a link for it to be emailed to them. Additionally, once the user registers the basic requirements, the system will automatically add their email addresses to a file that they regularly use to send out emails about the sales as well as other promotions. In the case of hacking issues, passwords should be verified. The firewalls should also run, and even antivirus should be present to limit the risk of availability and privacy problems. Consequently, it will be less likely for someone to hack into the software.
PART TWO
Edit Tests examine the particular areas of input data while rejecting the transactions whose data fields that do not fulfill the pre-established standards of quality of data-INPUT CONTROL.
Check Digits are calculated in a mathematical function of other digits in a numeric field. It purposely meant to test the validity of the associated records- INPUT CONTROL.
Passwords are meant to ensure validity- INPUT CONTROL.
Activity Listing is an Output Control that documents processing activities.
Control Totals is a Processing Control. It controls large amounts of data processing.
Logical is the access to technology on a computer while physical access refers to the entry of the actual equipment of the computers (Simkin, Rose & Norman, 2014). Physical access describes any time a user may reach the hardware of the computer. On the other hand, logical access is every other type of computer use. This is where the user connects to the system of the computer minus being in the similar departments as the machine (Parson, 2015). The two provides access to same characteristics particularly in the event of remote control software. However, the physical access enables the user a far more control over a system. Thereby, making it a potential security risk. Both are essential because they are all assets of the organization, and the integrated security system that entails both securities can significantly decrease the risk of attack and theft (Simkin, Rose & Norman, 2014).
References
Parson, A. (2015). What Are the Differences Between Logical & Physical Access to the Computer? | Techwalla.com. Techwalla. Retrieved 22 January 2017, from https://www.techwalla.com/articles/what-are-the-differences-between-logical-physical-access-to-the-computer
Simkin, M., Rose, J., & Norman, C. (2014). Core Concepts of Accounting Information (12th ed., p. 484). United States: John Wiley & Sons.
Stair, R. & Reynolds, G. (2010). Fundamentals of Information System (8th ed.). United States: Cengage Learning.