Saturday, February 2, 2013

Discuss Briefly Two (2) Types Of Active Threats Creatively And Innovatively


There are two types of Active Threats :-

1) Data Theft


Data theft define that a serious problem in business today. In many highly competitive industries, both quantitative and qualitative information about one's competitors is constantly being sought.
Data theft is a term used to describe when information is illegally copied or taken from a business or other individual. Commonly, this information is user information such as passwords, social security numbers, credit card information, other personal information, or other confidential corporate information. Because this information is illegally obtained, when the individual who stole this information is apprehended, he or she will be prosecuted to the fullest extent of the law.

Data Theft Prevention Customer Story (File) 


2) Sabotage 



Computer sabotage poses a very serious danger to any information system. The destruction of a computer or software can result in the bankruptcy of a firm. Disgruntled employees, especially fired ones, are common perpetrators of sabotage.
In some cases a defrauder may use sabotage to create confusion to cover up fraud. For example, an individual might after the accounting databases and later try to cover up by sabotaging computer disks or other media.
Sabotage has become a major issue for Web commerce. Despite annual expenditures for electronic security that exceed $6 billion, successful hacker attacks on Web sites have increased steadily. Even the largest and most sophisticated organizations have suffered, and almost every day the financial press continues to report cases of hackers completely taking over corporate Web sites.

How to sabotage a computer to prevent user logging on



Thank You :D

Monday, January 28, 2013

Briefly Explain Two (2) Types Of Intruders Creatively And Innovatively



Intruders define is anyone who accesses equipment, electronic data, or file without proper authorization. However, the intruders who attack information systems for fun and challenge are known as hackers. There are many type of intruders include unnoticed intruders, wiretappers, piggybackers, impersonating intruders and eavesdroppers.


There are two types of Intruders that famous is :-

1) Impersonating Intruders 


Impersonating intruders are individuals who pose as someone else in order to defraud the company. One type of intruder use an illegally obtained user ID and password to access the company's electronic resources. Many companies are very lax about security over user IDs and password. In some cases, an individual, thought "social engineering", can obtain a user ID and password simply by calling the company's technology center on the telephone. 

Another is the professional industrial spy, who, for example, typically enters though a rear door wearing a service or repair uniform. This individual knows from experience that many companies have a rear door that employees often use for cigarette breaks. This door frequently is blocked open so that the employees can easily reenter. It can be identified by the cigarette butts around it on the ground.


2) Eavesdroppers 


The phrase "Eavesdroppers" basically means that people who eavesdrop, or people who listen in on conversations, will only hear people saying bad things about them behind their back or without them knowing. Standard cathode-ray tubes used in common video display units emit electromagnetic interference on a frequency capable of being picked up by an ordinary television set. 

Anyone with this equipment can monitor sensitive information as it appears on the company's CRTs. Any information that passes though any public communication network is vulnerable to eavesdropping and piggybacking. For example, simply removing one wire from a Tandy ( Radio Shack) scanner will allow one to monitor analog cellular telephone communications. There are clubs of individuals who make a regular habit  of recording telephone conversations involving celebrities and public figures.

How To Install Cell Phone Spy Tracking Application



How To Hack Your Neighbors Internet



That All, Thank You :)






Saturday, December 15, 2012

Explain About Primary And Support Business Process Choose A Business Entity And Give Example On Each Of The Primary And Support Business Process.

I will describe to you guys about the business process that i has learned in class 3/12/2012. What I learned from Sir Noreffendy is about The Basic Business Processes Involved Primary and Supporting. 

Primary have Five (5) types which is :-

# Inbound Sales Logistic 
 # Outbound Sales Logistic
# Operation 
# Marketing 
# Services 

Supporting have Four (4) types they is :-

# Procurement 
# Human Resources 
# Technology Development 
# Firm Infrastructure




Business Process : " KIT KAT "



Created in 1935, KIT KAT was first knows as Rowntree Chocolate Chips. Two years later, the name was changed to KIT KAT. 

In 1988, KIT KAT became part of the Nestle's rage of confectionery products. It grew to be the No.1 chocolate brand in Malaysia, Enjoyed by both young and old as a light snack. Today, it is exported to more than 11 countries in Asia.

"Have a break, Have a KIT KAT" has come a familiar phrase. It aptly describe the enjoyment of the chocolate - coated wafers whenever one needs to chill out, such as when you are in the midst of heavy assignment.

The Ingredients are as followed :

MILK CHOCOLATE (SUGAR, MODIFIED MILK INGREDIENTS, COCOA BUTTER, UNSWEETENED CHOCOLATE, LACTOSE, SOYA LECITHIN, POLYGLYCEROL POLYRICINOLEATE, ARTIFICIAL FLAVOUR), WHEAT FLOUR, SUGAR, HYDROGENATED SOYBEAN OIL OR MODIFIED PALM OIL, UNSWEETENED CHOCOLATE, SODIUM BICARBONATE, SOYA LECITHIN, YEAST, ARTIFICIAL FLAVOUR.


Primary Business Process Of  "KIT KAT" :-


1) Inbound Sales Logistic 
- Receiving, storing and distribution of materials at the warehouse.
- Kit Kat (Nestle) workhouse is located in Kuala Lumpur.
- This is the interior part of the kit kat company.






2) Outbound Sales Logistic 
-Distributing products and services to customers over Malaysia 
- Send the stock each branch in Malaysia.






3) Operations
- Transforming inputs into products or services. 



4) Marketing
- Helping customers to buy the products or services of the firm.
- The product in Malaysia is that must be based with HALAL materials and its approved by higher authorities.


5) Service
- Post sale support provided to customers such as repairs and maintenance function.
- Doing promotions to attract customers to buyer their product.



Supporting Business Process :-

1) Procurement
- Buying the resources needed to carry out the entity is the primary activities.
- For example :- [ Material, Inventory, Fixed Assets ] need to carry out entries primary activities.






2) Human Resources
- Recruiting and hiring new employees benefits.





3) Technology development.
- Activity to improve company's product or services.





4) Firm infrastructure
- Manager : Help to operation the business.
- Accountant : To handle the business outflow and inflow
- Supervisor : To supervise salesperson.

Monday, December 10, 2012

Tutorial About UBS Skills


hi guys ,
I'm going to share with you guys what i learned in my AIS class - 27 November 2012. The first step we must create a new company, for example farzanavimala.DIA and Directory must be ASGN1.


Second step is at UBS interface, have to login before want to update the company from the UBS, we must put the user is ADMIN, for the password is UBS and for date are 27/11/2010.









The third step we must update company profile, before that must go to SETUP then go to GENERAL SETUP then can change the company name to "SUNNY ELECTRICAL COMPANY" , must put the closing date 31/12/2010 and account period, change to 1/1/2011 - 31/12/11.





The fourth step, we must add 8 new chart off account. At this step, we must key in the account number, account description, account types and then we have to save all of the chart of account. First we must go General ----> General Ledger A/C Maintenance. 





When we want to check the chart of account that we already been key-in, go to General ----> Print Chart Of Accounts. If have any mistakes, do correction of chart of accounts. 






Next step is add new batches. Create new batches at Transaction -----> Organize Batches. To check batches that have already been key-in is at Organize Batches.




After that, we must open the key in business transaction at ADD ENTRY AND QUICK ENTRY, for the "add entry" go to Transaction ----> Transaction File maintenance. It is we must key-in the date, description, and debit/credit (amount) then save.






Lastly, do "Backup", fo to backup, from "B:/ " change to C:/ " , then minimize UBS maximize my company go tp file "drive c: backup" then rename the backup.ACC to backup.farzanavimla-Dia-.ACC. 











That all we learn from sir Noreffendy :)
Thank You..!

Sunday, December 2, 2012

My 1st Blog Post Regarding Accounting Information System (DAC0163) Mini Blogging Project

Hello!!! (:

Lecturer : Sir Noreffendy




This is my first blog for the subject Accounting Information System. This blog must made by group or individual . But i choose to do this blog made by group of two; me (Nurfarzana) and my beloved friend (Vimala). We were asked to create our own blog to this subject and every week, we need to update our blog based on the topic given by the lecturer in the class. 

This blog also will be become a pioneer mini project for 
this subject. So, I really hope that blog will meet the objective of this subject and can help me and other students in the future. This is some reason why me and my friend like with the idea of mini blogging project :-

# Can help me to improve my grammar 
# We can learn more how to use blog's
# We can learn more or get more info about current issues and get more information of what is going on surrounding of me.



That's All (: Thank You 


Wednesday, November 21, 2012

The Accounting Information System (DAC0163) Disclaimer



This blogging mini project is part of creative and innovative teaching under Accounting & Information System (DAC0163).

All posts made by the owner of this blog is solely for the purpose of discussion and academic learning only and to fulfill the requirement of mini project Accounting & Information System (DAC0163).

This is a pioneer mini project for Accounting & Information System (DAC0163) and any advantages or disadvantages occurred will be taken into consideration for improvement in the future.