Hacker
Computer virus
Antivirus software
Fault-tolerant computer systems
On-line transaction processing
Security
Bugs
Controls
General controls
Application controls
Implementation controls
Software controls
Program security controls
Hardware controls
Computer operations controls
Data security controls
Administrative controls
Segregation of functions
Input controls
Input authorization
Data conversion
Batch control totals
Edit checks
Processing controls
Run control totals
Computer matching
Output controls
Standing data
Risk assessment
MIS audit
Resource allocation
Software metrics
Walkthrough
Debugging
Data quality audit
14.1 System Vulnerability and Abuse
Why Systems are Vulnerable
Concerns for System Builders and Users
System Quality Problems: Software and Data
14.2 Creating a Control Environment
General Controls
Application Controls
Developing a Control Structure: Costs and Benefits
The Role of Auditing in the Control Process
14.3 Ensuring System Quality
Software Quality Assurance
Data Quality Audits
Swissair is discussed on pages 430-431.
The Internet Law Page contains a lengthy technical and legal discussion of Robert Morris' 1988 Internet Worm.
Much more information about available services may be found at Comdisco Continuity Services (formerly Disaster Recovery Services)and SunGard Recovery Services Websites.
Return to homepage of CS 590M - Information Systems