Sunday 3 February 2013

Discuss briefly TWO(2) TYPES of active threats Creatively and Innovatively.

Assalamualaikum...

This time, I would like to explain to you all about the active threats. As this is our project topics for week 6. First of all, the active threats was a method that an individual might use to perpetrate an information system fraud. Active threats consists of a few methods such as input manipulation, program alteration, direct-file alteration, data theft, sabotage and misappropriation or theft of information resources. So, for this topic, I choose to explain about the data theft and misappropriation or theft of information resources.

     1. DATA THEFT

    • Theft of important data is a serious problem in business today. In many highly competitive industries, both quantitative and qualitative information about one's competitors is constantly being sought. The courts have long upheld that data stored in a company's computers are private and cannot be used without the company's permission. A considerable amount of information is transmitted between companies via the internet. This information is vulnerable to theft while en route. It may be intercepted or tapped. It also may be possible to steal an optical disk or diskette by smuggling it out of the firm in the pocket or briefcase. Further, individuals with access to e-mail simply might copy or attach proprietary information and then transmit it out over the internet. Using this method, a perpetrator could steal very large amounts of information in only a few minutes time.



     2. MISAPPROPRIATION OR THEFT OF INFORMATION RESOURCES
    • One type of misappropriation of information resources exists when employees use company computer's resources for their own business. For example, five employees were accused of using their employer's mainframe computer during slack hours to operate their own data processing firm. The employees used the computer so heavily that their employer almost inadvertently upgraded the system to keep up their demand.
    • To extent of this problem, like others type of computer fraud, is not well known. However, it is very likely that this problem occurs to some degree in many companies. For an example, several employees stole their company's mainframe computer over a period of days, smuggling it out the back door a piece at a time.





VIDEO
# data theft prevention story

# trade secrets and theft of information resources

Briefly explain TWO(2) TYPES of INTRUDERS Creatively and Innovatively

Assalamualaikum and hye everyone!

For this topic, as u can see that our lecturer, Sir Noreffendy asked us to explain two types of intruders. As we know, INTRUDERS were a persons who accesses equipment, electronic data, or files without proper authorization. Besides that, intruders who attack information system for fun and challenge are known as HACKERS.






There were also a few types of intruders such as unnoticed intruders, wiretappers, piggybackers, impersonating intruders and eavesdroppers. But for this topic, i will only explain to u just two types of intruders that is piggybackers and eavesdroppers.


     1. PIGGYBACKERS
    • It was the most sophisticated type of wire tapping is called piggybacking. With this method, the penetrator intercepts legitimate information and substitutes fraudulent information in its place.





     2. EAVESDROPPERS
    • Was a Standard Cathode-ray tubes (CRTs) that used in common video display units emit electromagnetic interference (EMI) on a frequency capable of being picked up by an ordinary television set. Wim Van Eck, a Dutch electronics researcher, proved to a number of banks that it was possible to read the information on their CRTs almost a mile away using an ordinary television, a directional antenna, and an external sync generator. Anyone with this equipment can monitor sensitive information as it appears on the company's CRTs. Any information that passes through any public communication network is vulnerable to eavesdropping and piggybacking. For example, simply removing one wire from a Tandy (Radio Shack) scanner will allow one to monitor analog cellular telephone communications. There are clubs of individuals who make a regular habit of recording telephone conversations involving celebrities and public figures.






VIDEO

# this video shows us how to identify the piggybackers.

# eavesdropping on bluetooth handset.



Sunday 16 December 2012

Choose ONE business entity. Give example for each of the PRIMARY BUSINESS PROCESSES (5) and SUPPORTING BUSINESS PROCESSES (4)

BUSINESS ENTITY : KFC Holdings (Malaysia) Bhd

PRIMARY BUSINESS PROCESS :

1.   INBOUND SALES LOGISTICS
     - Receiving, storing, distribution of materials at the warehouse.

# This is where the kfc holdings keep their stocks before they send it to their outlet in their warehouse which that their central warehouse is at Hicom,Glenmarie in Shah Alam.

2.   OUTBOUND SALES LOGISTICS
     - Distributing products and services to customers.


# The picture above shows a few of the products that the kfc holdings sold and that will be serve to the customers at the cashier counter.

3.   OPERATIONS
     - Transforming inputs into products or services.

# picture above shows that,that person is trying to mix the chicken and the flour to fry that chicken and become it as a products to sell.

4.   MARKETING
     - Helping customers to buy the products or services of the firm.

# one of the marketing strategy of the KFC to help the customers to buy their products

5.   SERVICE
     - Post sale support provided to customers such as repairs and maintainence function.

# the picture show the services that also been serve by the kfc to their customer like sending the products to customer whenever the customer has to wait for the products to get ready.

SUPPORTING BUSINESS PROCESS

1.   PROCUREMENT
     - Buying the resources needed to carry out the entities primary activities.

 # chicken that has not being process.

# these are the chickens that has been process of kfc holding use to make it as a fried chicken that will be sell in their store.

2.   HUMAN RESOURCES
     - Recruiting and hiring new employee
     - Training, paying salary, employee benefits.

# KFC is trying to hiring a new employee and these is one of the application form that the applicants will fill up to works in KFC.

# management of the kfc

3.   TECHNOLOGY DEVELOPMENT
     - Activity to improve company products or services.

4.   FIRM INFRASTRUCTURE
     - Accountants, lawyer, administrative.

UBS skills that we have learned untill today

Assalamualaikum !!



From this topic,we are going to tell you all about what did Sir Noreffendy Mohamed did taught us in the lab classes. Sir Noreffendy did taught us on how to use the UBS system since our 1st session class. In the 2nd class of our lab classes,we had learned a few new skills about the UBS system. Therefore,in this post,we are going to tell you everything about the UBS system that Sir Noreffendy taught us.

At the end of this post,i will upload the tutorial video on how to use the UBS system so that you can get all of the information more clearly. We hope that u guys enjoyed yourself to watch that video and hope that the video that we publish will not makes you all bored.

FIRST CLASS :
 -Sir Noreffendy ask us to :
 
1.   Entering the UBS system. Then we have to click "ADD" to create a new company.
2.   "TYPE" the company name and also the directory. For example :
           a)   Company name : nabilahqila04-DIA
           b)   Directory : ASGN1


3.   After that we have to "SAVE", then "CANCEL"
4.   Then we have to "SIGN IN" as ADMIN and also "TYPE" the password that had been given to us.

             # As u can see the picture above,the DATE also we have to "CHANGED" 
follow the basis year of  the transactions.

5.   After sign in,we have to go to "SETUP WIZARD" to update about the "COMPANY DETAILS".
6.   Here we have to update the company again by go to the "HOUSEKEEPING" ---> "SETUP" --->
      "GENERAL SETUP" 

#  As u can see the red box above in the picture, you have to be very carefully on the accounting year.
We have to change the "LAST ACCOUNTING YEAR" at the "CLOSING DATE".

7.   Next, we have to go to the "GENERAL" and click the 1st general which is "GENERAL LEDGER
       A/C MAINTAINANCE" to enter the journal.


8.   After finish,you have to go back to the "GENERAL" and click the 2nd general which is "ENTER
      OPENING BALANCES" to check added journal. The example you can see from the above
      picture.
9.   Then,you go to the "TRANSACTIONS" and click the 2nd transactions which is "ORGANIZES
      BATCHES". You have to add all the batches as shown below :


10.  After that, you go back to the "TRANSACTIONS" and click the 1st transactions which is
       "TRANSACTIONS FILE MAINTAINANCE" to add all the transactions that you have made.

       # From the picture above,as you can see,when you want to add the transactions,you have to :
                     a)  "CHOOSE THE BATCHES"
                     b)  "ENTER DATE"
                     c)  "ENTER ACCOUNT NUMBER"
                     d)  "ENTER DESCRIPTION"
                     e)  "ENTER THE AMOUNT IN (DEBIT) OR (CREDIT)
                     f)   "CLICK SAVE"
                     g)  "CLICK ACCEPT"

11.  After we finish all the add and edit,to check back the transactions whether all the transactions
       that we add is correct or not,we go to the "TRANSACTIONS" and click the 3rd transcations
       which is "PRINT BATCH OF TRANSACTIONS".
12.  The last skills that we have learned is to do a "BACKUP FILE". We have to go to "FILE" and
       click "BACKUP" and choose to backup on our C-drive.


13.   Lastly,we have to go to "MY COMPUTER" in our dekstop which contain the C-drive and click it.
        After that we will see the backup files folder and click it. Inside it we can see our backup files
        from the UBS system. But,you have to be CAREFUL and do not double click at the backup
        document because it might cause the document to CORRUPTION. So,we have to click our right
        hand side mouse at the document and click rename. Then,we change the document name to
        our name such as "BACKUP.ACC1.NABILAHQILA.GC".  

SECOND CLASS :
 - Sir Noreffendy taught us another skills of the UBS system. Such as :

1.   Like in the 1st class,we have to entering the UBS system and sign in as admin.
2.   Then go to "HOUSEKEEPING" ---> clear files, generate sample chart ---> choose option 1 to
      clear both chart of account transactions.
3.   After that we can only restore the document that we had create earlier. We need to go to "FILE"
      and click "RESTORE". Then choose C-drive.
4.   Next,we have to enter the business transactions with
                     ~ ADD ENTRY
                     ~ QUICK ENTRY
5.   After we finish add and save the transactions, we have to do the backup again for the changes
      that we have made.

~ THE END~




Wednesday 21 November 2012

My 1st Blog Post Regarding Accounting Information System [DAC0163] Mini Blogging Project



This blog made by a group of two, me and my friend; Nabilah & Qila. This blog is mainly about Accounting Information System (AIS) [DAC0163]; which is one of the current subjects that we're taking here at Management & Science University (MSU), Shah Alam, as a student of Diploma in Accountancy (DIA).

On our first day in the lab class with Sir Noreffendy Mohamed, who is teaching us AIS; he passing us paper about what we need to do for our starting point in learning AIS and "Mini Blogging Project" is one of the main things.

Well, let's just say that most of us (more like all student in the class) were shocked; since not all of us have any experiences with blogging. Though, we're lucky since Sir give us choice whether to do it individually or by a group of two.

I think the idea of using blog as a purpose of discussion and academic learning is a great interesting way of learning this subject for us. By doing this, we're not only have the opportunity of learning AIS, but also the chance to learn using Blogger and others thing that is needed to make the blog more interesting; since this blog is publish to public. This make it that not only us who could learn about it, but others too.


Thank you, Sir Noreffendy for giving us the opportunity.


Of course good luck to our others class member and hopefully we could achieve the main purpose of Mini Blogging Project.

Tuesday 20 November 2012

The Accounting Information System [DAC0163] Disclaimer

This blogging mini project is part of creative and innovative teaching under Accounting & Information System [DAC0163]

All posts made by the owner of this blog is solely for the purpose of discussion and academic learning only and to fulfill the requirement of the mini project Accounting & Information System [DAC0163].

This is a pioneer mini project for Accounting & Information System [DAC0163] and any advantages or disadvantages occurred will be taken into consideration for improvement in the future.