This website uses cookies to ensure you have the best experience. Learn more

Input Controls Essay

837 words - 4 pages

Running head: Input Controls

Input Controls
Tynisha Ellis
Dr. James Francisco
Systems Analysis and Development
February 12, 2012

Abstract
A company must do everything in its power to protect its data. This includes not only the firm’s own information, but that of its customers, employees, and suppliers. In this paper I will be describing four types of input controls, in user interface design, and their primary functions. Input control includes the necessary measures to ensure that input data is correct, complete and secure (Rosenblatt & Shelly, 2012). Some examples of input controls are audit trails, encryption, password security, and data security, just to name a few. ...view middle of the document...

4. Intrusion Detection:  This is process that detects any unauthorized use. Audit trails can help in intrusion detection if they record appropriate events (Gopalakrishna, 2000). Determining what events to audit so that audit trails can be used in an effective manner to aid intrusion detection is one of the present research issues being looked into by the research community (Gopalakrishna, 2000).
Encryption is the most popular and the most effective type of input control. Sensitive data can be encrypted, or coded, in a process called encryption, so only users with decoding software can read it (Rosenblatt & Shelly, 2012). The two main types of encryption are asymmetric encryption and symmetric encryption. Asymmetric encryption uses two keys that are mathematically related and are known as the public key (known to everyone and can be freely distributed) and the private key (known only to the recipient of the message) (Ciampa, 2009). Symmetric encryption, also known as private key encryption, uses the same key to decrypt and encrypt messages.
An important feature of security, today, is a secure password. A password is a secret combination of letters and numbers that serves to authenticate (validate) a user by what he knows (Ciampa, 2009). A password must also be of a sufficient length and complexity so that an attacker cannot easily guess the password (Ciampa, 2009).
Another input control is data security. Data security policies and procedures protect data from loss or damage, which is a vital goal in every organization (Rosenblatt & Shelly, 2012). Also data security ensures...

Other Papers Like Input Controls

Input Controls Essay

1678 words - 7 pages Assignment 3: Input Controls and Restricting User Interface INPUT CONTROLS No matter how data enters an information system, the quality of the output is only as good as the quality of the input. When developing or purchasing a new system or application, it is important that the system or application has adequate input controls. “Input controls ensure the complete and accurate recording of authorized transactions by only authorized users

Cis 210 Input Controls Essay

1116 words - 5 pages Input Controls Input control includes the necessary measures to ensure that input data is correct, complete, and secure (Rosenblatt & Shelly, 2012). It is ultimately important that during the user interface design or input design stage to focus on input control, which will start with source documents that will promote data accuracy and quality. Therefore, the main objective of input design is that we ensure the quality, accuracy

Cis 210 Input Controls

1173 words - 5 pages timeliness of input data happens during its conversion from its original source into computer data or it is entered into a computer application. Input controls could also be considered fail-safes, which ensure that data is entered into the system correctly. We must also remember the term garbage in, garbage out (GIGO), because it will not matter how much data is enter into an information system, but the quality of the data that is outputted is

Accounting

2232 words - 9 pages controls are one of the most important set of controls as they are the ones that are placed on the day to day running of the system. Procedural controls are particularly effective in detecting whether a system has been tampered with and so are effective in detecting fraud. Procedural controls are divided into those controls placed on input, output, processing and storage. Input Controls These are procedural controls that are placed on the input

Internal Audit

2466 words - 10 pages procedures designed into computer programs. Such manual and computer control procedures comprise two types of control. Application controls: Manual or automated procedures that typically operate at a business process level. Application controls can be preventative or detective in nature and are designed to ensure the integrity of the accounting records. Application controls relate to input, processing or output data. General controls

Internal Controls

1129 words - 5 pages accuracy and reliability of accounting data, to promote operational efficiency, and to encourage adherence to prescribed managerial policies. First, there we will identify the risks and internal control points by incorporating these risks into the flowcharts provided in the information systems. The risks for the payroll system are bad inputs that would lead to deficient or distorted payroll amounts (requiring input controls), improper access of

Kudler Fine Foods

1030 words - 5 pages is low. Identify all risks and internal control points by displaying them in a flowchart Inventory Document Inventory Order Start To show where the risks may take place, our firm has constructed an updated flowchart of the system with the controls included. Inventory Received Invoices Processed Input Inventory into the system Input Invoices into the system Vendor Service Management Approval Management Approval As one

Management Controls

1041 words - 5 pages controls pertain to specific computer applications. They include controls that help to ensure the proper authorization, completeness, accuracy, and validity of transactions, maintenance, and other types of data input. Examples include system edit checks of the format of entered data to help prevent possible invalid input, system enforced transaction controls that prevent users from performing transactions that are not part of their normal duties, and

Ethics and Why They Are Important in Using Accounting Software

565 words - 3 pages makes it more likely employees and accountants will not be willing to input incorrect information just to get the job done (Wicks, 2014). Segregation of Duties Internal controls are essential in ethical accounting. Often in manual accounting, different employees are assigned different tasks of the accounting method. Accountants and employees sometimes feels it is easier perform unethical practices in manual accounting because so many hands

Computer Science Xyz Company

1026 words - 5 pages access restricted zones in the organization. The system is also prepared for any disaster recovery by using disaster recovery management. 8. Production, Input/Output Controls The input for the production is the responsibility of only the authorized users. The data is sensitive and it can be retrieved after its disposal. The company has not as such implemented any controls for data disposal. 9. Contingency Planning The company takes back-up after

Billy Bob

339 words - 2 pages Shareowners. The purpose of this report is for an independent accounting firm to look over the audit and give their opinion on the presentation of the financial statements. Coca-Cola received an unqualified report. The third report basically says that the independent auditors audited the internal controls of Coca-Cola. It states that they have a clear understanding of the internal controls. 5. Trap doors are breaks in a program that give the possibility to input other instructions at any time. It helps programmers debug the system if needed. A trojan horse is a type of trap door. It involves hiding programming code in another program.

Related Essays

Input Controls Essay

1173 words - 5 pages An HTML form is a section of a document containing normal content, markup, and special elements called controls.” These controls are commonly referred to as input controls, according to the World Wide Web Consortium. There are many types of input controls that can be used in a web form. They help to provide a framework for the kind of data that will be submitted by users. Selecting the correct input control for a data field is critical. Text

Input Controls Essay

709 words - 3 pages Input Controls Assignment 3 Roseana Clark | CIS 210 Professor Nancy Romero | 11/15/2014 Application controls are used to refer to transactions and any data that relates to the computer based application system. They should be kept specific to each application. Application controls may be manual or programmed, but are necessary in the support of record accuracy as well as data validity. These controls are used in processing, output and

Input Controls Essay 1142 Words

1142 words - 5 pages Assignment 3: Input Controls La Vaughn Aiken Prof. Robert Joseph, Ph.D May 16, 2012 CIS 210 Input Controls The objective of input design is to ensure the quality, accuracy, completeness, and timeliness of input data during its conversion from its original source into computer data, or entry into a computer application. Data entered into a computer application from either manual online input or by scheduled automated processing: batch

Input Controls Essay 1227 Words

1227 words - 5 pages “An HTML form is a section of a document containing normal content, markup, and special elements called controls.” These controls are commonly referred to as input controls, according to the World Wide Web Consortium. There are many types of input controls that can be used in a web form. They help to provide a framework for the kind of data that will be submitted by users. Selecting the correct input control for a data field is critical. Text