Running Program Prematurely Terminates - Biglaang Namatay
Running Program Prematurely Terminates - Biglaang Namatay
Automatic rollback
This feature manages to backed out the
Address the availability of information
incomplete transactions, so the database is
processing facilities when needed.
returned to the state it was in before the
Data Centers – an artifact of central site transaction began.
management of large mainframe systems.
running program prematurely terminates - biglaang
[Mainframe- A mainframe is a large, powerful namatay
computer used for high-speed data processing
b. Uninterruptible Power Supply
and critical applications1234. It can connect to
Uses batteries - to continue process during a
multiple users and devices simultaneously and
power outage.
handle large amounts of data transactions]
Will supply long enough for files to be properly
Systems migrating to “client-server” and closed and for users to log off
distributed processing c. Alternative Processing Facility
Use during main channel downtime
Data center operation controls are also
appropriate for network operation d. Disaster Recovery Plan
[Client-server - A server accepts the client’s documents detailed recovery procedures to
requests, processes them and provides the quickly and smoothly restore an organization's
required response. processing capabilities after a catastrophic event.
Network and data service center operation 7.6c. System software acquisition, implementation,
controls need to be implemented: and maintenance controls
Backup controls – All files should be backed up System software includes:
routinely and the backup copies should be stored in a
secure, off-site location and tested regularly for Database management systems
readability. Communication software
- It is necessary to backup program files only Operating system
one time – done aft the programs installed Utility programs
and all custom work completed. Data files Security software
should be backed up frequently. –Transaction These control activities also regulate:
files - atleast once a day. Master files – once
per posting period. Files w/ real-time posting Logging
– more often than once a day Tracking
Downtime Controls Monitoring activities of the information system
The repair of computer hardware may take several
days and, occasionally, several weeks. Therefore, to
reduce the amount of downtime, maintenance 7.6d. Application software section, implementation,
schedules should be established for all computer and maintenance controls
hardware.
Control activities also should address the application
software selection, implementation, and maintenance of
Recovery controls
application software.
deal with prompt recovery of equipment failure and
natural disasters that could put the information Specifications for new applications should be drawn up
processing facilities out of operation for an extended jointly by users and IT personnel
period.
Application software such as: Accounting systems Input Verification Controls
As data are entered in a screen form, they are verified
New applications and modifications to applications
for correctness in numerous ways.
should be properly:
Some commonly used checks are:
Authorized
- Valid codes
Tested
- Reasonableness of amounts
Approved
- Valid data type
Documented
- Valid field length
Implementation of new software:
- Logical relationships
Representatives of user departments (Accounting and - Anticipated contents
Internal Auditing) should be involved in selection of new - Valid date
application software Correction of Data-Entry Errors
Error correction follows error detection. It may be
External Auditors should be consulted - to ensure the possible to rekey a transaction to correct it. Correcting
auditability of the system or reversing entries must be made.
Disclosure
7.7d. Master File Maintenance Controls Independent review and continuous
Are designed into the master file maintenance improvement
function, which is used to add records, change the Change management
contents of certain fields in records, and detect
records.
7.10 COMPUTER FORENSICS
- Prohibiting a user from duplicating or
changing an existing primary key field
- Probihiting a user from changing an account
Computer forensics
balance
Data fingerprints
7.8 MONITORING
Conducted on an
- Ongoing basis (
- Separate project
- Combination of both