ORDOÑEZ, PRECIOUS DANIELA ELLAINE R.
BSA 4A
1. Access rights, password security, virus protection, and audit trail security are all suitable access
controls for the current circumstance. First and foremost, access privilege is crucial since it
dictates who can only access the data. Additionally, so that they may assess whether their staff
members adhere to and formally admitting their obligations to preserve the strict confidentiality
of the information they hold. As a result, privileges should be properly managed and closely
inspected to ensure that they adhere to organizational policy and internal control principles.
Control by password is the second. Additionally, it is crucial for the sake of protecting the data of
the business. By adding passwords into their systems, businesses can improve their level of
security, lower their danger of data loss, and stay clear of damaging infections (virus control).
Finally, the auditing process control is crucial because it enables the company to effortlessly
track and identify the files in which they store a variety of significant data, including sales,
inventory, and cash receipts, which are all recorded by the business.
2. An organization ought to deliver stronger passwords to prevent damaging risks and reinforce
their security systems to limit the possibility of fraud and unauthorized entry from online
fraudsters as part of the safety measures and guidelines that may mitigate these risks.
3. That I will set up a monitoring and accessibility control system in our firm's systems that can be
concealed from my employees and can only be observed by me as their superior in order to
discover a fraud scheme that is taking place inside my company. And in order to stop this kind of
deception from happening, I'll keep keeping an eye on our systems and tighten their security and
passwords.