kamko 18

Threats take many form

•White collar crime, natural disasters (earthquakes, floods), vandalism, and carelessnes.
•Computer center security: hardware à jika perangkat keras fails, gagal maka MIS fails. Ancaman kegagalan dapat diminimalkan oleh implementing security precautions that prevent access by unauthorized personnel and by taking steps to keep all hardware operational.
software
•Unless properly controlled, the software for an MIS can be modified for personal gain. Thus, close control over software development and the documentation of an MIS is needed to minimize the opportunity for computer crime. Operational control procedures that are built into the design of an MIS will constantly monitor processing accuracy.
File /data bases
•The data base contains the raw material for information. The files /data bases are the life blood of a company and must be protected.

Author: rasp

Saya adalah pejuang, pekerja informatics ipos, mujahid fi sabil lillaah, hamba Allah SWT.

Tinggalkan Balasan

Alamat email Anda tidak akan dipublikasikan. Ruas yang wajib ditandai *