Operating System Weaknesses
In contrast to main frame systems, PCs Provide only minimal security for data files and programs contained within them. This control weakness is inherent in the philosophy behind the design of PC operating systems. Intended primarily as single-user systems, they are designed to make computer use easy and to facilitate access, not restrict it. This philosophy, while necessary to promote end-user computing, is often at odds with internal control objectives. The data stored on microcomputers, that are shared by multiple users are exposed to unauthorized access, manipulation, and destruction, Once a computer criminal gains access to the user’s PC, there may be little or nothing in the way of control to prevent him or her from stealing or manipulating the data stored on the internal hard drive.
103
Weak Access Control
Security software that provides logon procedures is available for PCs. Most of these programs, however, become active only when the computer is booted from the hard drive. A computer criminal attempting to circumvent the logon procedure may do so by forcing the computer to boot from a CD-ROM, whereby an uncontrolled operating system can be loaded into the computer’s memory. Having bypassed the computer’s stored operating systems and security package, the criminal may have unrestricted access to data and program on the hard disk drive.
Operating System Weaknesses In contrast to main frame systems, PCs Provide only minimal security for data files and programs contained within them. This control weakness is inherent in the philosophy behind the design of PC operating systems. Intended primarily as single-user systems, they are designed to make computer use easy and to facilitate access, not restrict it. This philosophy, while necessary to promote end-user computing, is often at odds with internal control objectives. The data stored on microcomputers, that are shared by multiple users are exposed to unauthorized access, manipulation, and destruction, Once a computer criminal gains access to the user’s PC, there may be little or nothing in the way of control to prevent him or her from stealing or manipulating the data stored on the internal hard drive. 103 Weak Access ControlSecurity software that provides logon procedures is available for PCs. Most of these programs, however, become active only when the computer is booted from the hard drive. A computer criminal attempting to circumvent the logon procedure may do so by forcing the computer to boot from a CD-ROM, whereby an uncontrolled operating system can be loaded into the computer’s memory. Having bypassed the computer’s stored operating systems and security package, the criminal may have unrestricted access to data and program on the hard disk drive.
การแปล กรุณารอสักครู่..
