{"id":422,"date":"2012-05-14T07:59:39","date_gmt":"2012-05-14T00:59:39","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=422"},"modified":"2012-05-14T07:59:39","modified_gmt":"2012-05-14T00:59:39","slug":"kamko-18","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/14\/kamko-18\/","title":{"rendered":"kamko 18"},"content":{"rendered":"<p>Threats take many form<\/p>\n<div>\u2022White collar crime, natural disasters (earthquakes, floods), vandalism, and carelessnes.<\/div>\n<div>\u2022Computer center security: hardware \u00e0 jika perangkat keras fails, gagal maka MIS fails. Ancaman kegagalan dapat diminimalkan oleh implementing security precautions that prevent access by unauthorized personnel and by taking steps to keep all hardware operational.<\/div>\n<div>software<\/div>\n<div>\n<div>\u2022Unless properly controlled, the software for an MIS can be modified for personal gain. Thus, close control over software development and the documentation of an MIS is needed to minimize the opportunity for computer crime. Operational control procedures that are built into the design of an MIS will constantly monitor processing accuracy.<\/div>\n<\/div>\n<div>File \/data bases<\/div>\n<div>\n<div>\u2022The data base contains the raw material for information. The files \/data bases are the life blood of a company and must be protected.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Threats take many form \u2022White collar crime, natural disasters (earthquakes, floods), vandalism, and carelessnes. \u2022Computer center security: hardware \u00e0 jika perangkat keras fails, gagal maka MIS fails. Ancaman kegagalan dapat diminimalkan oleh implementing security precautions that prevent access by unauthorized personnel and by taking steps to keep all hardware operational. software \u2022Unless properly controlled, the &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/14\/kamko-18\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;kamko 18&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-422","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/422"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=422"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/422\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}