24周年

财税实务 高薪就业 学历教育
APP下载
APP下载新用户扫码下载
立享专属优惠

安卓版本:8.7.31 苹果版本:8.7.31

开发者:北京正保会计科技有限公司

应用涉及权限:查看权限>

APP隐私政策:查看政策>

HD版本上线:点击下载>

Information Technology (三)

来源: 正保会计网校 编辑: 2015/08/03 13:53:33 字体:

Client-server and peer-to-peer systems

These concepts are similar to centralised and decentralised, but are not quite identical.

In a client-server arrangement, a powerful computer (the server) is dedicated to providing a service to other computers in the network (the clients). Typical services provided are:

• File storage (file servers)

• Handling printing (print server)

• Handling the sending and receiving of emails (mail servers).

There is an element of centralisation here, but although files might be held centrally on the server they will often be processed locally. For example, a report will be held on the server, but when it is being edited it is downloaded to the user’s local machine (client). The edited version will be saved back to the server where other users can then access it. Obviously there will be great disruption if the server fails. Access rights to files are set centrally and typically enforced by users’ log-on information.

Traditionally, in client server networks each client would have had a copy of, say, Word for Windows. Documents would have been downloaded from the server for local editing then saved back to the server. The disadvantage of this is that each machine in the network needs a copy of Word and if the company was upgrading its software all copies of the program would have to be changed. Providing the software initially for all machines and its subsequent management is very expensive. With cloud computing, this approach has changed. There is only one copy of the software on the server within a web-based interface. Users log into the web system and their processing is then carried out on the server or a ‘cloud’ of servers. It appears to each user that they have a local version of the software, but what they are really seeing is the program operating in the server. Client machines can be ‘thin-clients’ which are not very powerful as they do not have to store much data and software nor do they have to carry out much processing. Hardware, software and maintenance costs are greatly reduced, though the system is vulnerable to service disruption.

Hotmail and Gmail provide examples of this approach. Whenever you want to write an email you log into the web email account and the processing is carried by the system’s computer cloud – not your computer. All it has to do is to handle the interface.

In peer-to-peer networks, two or more computers are connected directly without the need for a server. Access rights to files are given by individual users to specified other users. This is a simpler system to set-up, requiring no specialist operating system or specialist staff and many home systems are like this. It is a much more distributed system than client server systems and therefore has back-up and security issues.

Controls in IT systems

IT poses particular risks to organisations’ internal control and information systems. This can lead to their operations being severely disrupted and subsequently to lost sales, increased costs, incorrect decisions and reputational damage.

Risks include:

• Reliance on systems or programs that are inaccurately processing data, processing inaccurate data, reporting inaccurate, misleading results - or all three.

• Unauthorised access to data leading to destruction of data, improper changes to data, or inaccurate recording of transactions.

• Particular risks may arise where multiple users access a common database on which everyone in the organisation relies.

• The possibility of IT personnel gaining access privileges beyond those necessary to perform their assigned duties.

• Unauthorised changes to data in master files. For example, changing a selling price or credit limit.

• Unauthorised changes to systems or programs so that they no longer operate correctly and reliably.

• Failure to make necessary changes to systems or programs to keep them up-to-date and in line with legal and business requirements.

• Potential loss of data or inability to access data as required. This could prevent, for example, the processing of internet sales.

Controls in computer systems can be categorised as general controls and application controls.

我要纠错】 责任编辑:蓝色天空

免费试听

  • Jessie《FR 财务报告》

    Jessie主讲:《FR 财务报告》免费听

  • 张宏远《MA 管理会计》

    张宏远主讲:《MA 管理会计》免费听

  • 何 文《SBL 战略商业领袖》

    何 文主讲:《SBL 战略商业领袖》免费听

限时免费资料

  • 近10年A考汇总

    历年样卷

  • 最新官方考试大纲

    考试大纲

  • 各科目专业词汇表

    词汇表

  • ACCA考试报考指南

    报考指南

  • ACCA考官文章分享

    考官文章

  • 往年考前串讲直播

    思维导图

回到顶部
折叠
网站地图

Copyright © 2000 - www.chinaacc.com All Rights Reserved. 北京正保会计科技有限公司 版权所有

京B2-20200959 京ICP备20012371号-7 出版物经营许可证 京公网安备 11010802044457号