dc.contributor.author | Ripley, Lisa | en_US |
dc.date.accessioned | 2017-04-18T13:42:16Z | |
dc.date.available | 2017-04-18T13:42:16Z | |
dc.date.issued | 1984 | |
dc.identifier.uri | http://commons.lib.niu.edu/handle/10843/17461 | |
dc.description | Includes bibliographical references. | en_US |
dc.description.abstract | Computers are becoming increasingly important to accounting. General ledgers, cost accounting, and fixed assets can all be computerized. Microcomputers and electronic spreadsheets assist in the preparation of schedules for all facets of accounting. As computer systems grow, the vulnerability of the system also grows. On a larger system, control over the system is more difficult to maintain. Unauthorized users may obtain valuable and confidential information. The vulnerability of the system is also apparent if the computer system breaks down. The activity of an entire department may be halted if the system is out of operation. Keeping a computer system secure from break-in and break-down should be very important to a corporation that heavily depends on computers. Those people responsible for the operation of a computer system should be aware of computer security and controls. | en_US |
dc.format.extent | 5 pages | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Northern Illinois University | en_US |
dc.rights | NIU theses are protected by copyright. They may be viewed from Huskie Commons for any purpose, but reproduction or distribution in any format is prohibited without the written permission of the authors. | en_US |
dc.subject | computer security | en_US |
dc.title | What everyone needs to know about computer security | en_US |
dc.type.genre | Dissertation/Thesis | en_US |
dc.type | Text | en_US |
dc.contributor.department | Department of Computer Science | en_US |
dc.description.degree | B.S. (Bachelor of Science) | en_US |