Matches in SemOpenAlex for { <https://semopenalex.org/work/W73539845> ?p ?o ?g. }
Showing items 1 to 70 of
70
with 100 items per page.
- W73539845 startingPage "83" @default.
- W73539845 abstract "MICROCOMPUTER SECURITY AND CONTROL Six inexpensive and simple techniques. The accounting professional who has worked around microcomputers for any length of time knows how difficult it is to maintain their security. With very little trouble, a user can access confidential records and change, copy or erase them. Although no internal control system will protect the microcomputer completely from a determined and sophisticated user, some simple and inexpensive techniques can substantially reduce the likelihood of security breaches. The general strategy behind security is to create layers, or levels, of obstacles through which an intruder must pass before reaching confidential data. The more layers there are, the more difficult it is to access unauthorized information and, hence, the greater the internal control. These layers need not be elaborate or tremendously sophisticated to be effective. That they are in place and it is not immediately apparent how to get around them will increase security. Some of the suggested techniques involve nothing more than using attributes of Microsoft's disk operating system (MS-DOS); others require purchasing a software package. All of them will increase control over valuable information. HIDDEN FILES MS-DOS for IBM and compatible machines has several obscure capabilities. For data security purposes, the best of these is the ability to hide files, directories and characters from view. Hiding a file or directory means the user can't see any part of the file or directory name. Hiding characters allows the user to see part of the file or directory name but keeps one character invisible. Hidden files and directories are considered first. Suppose you have hidden a file named Payroll.90 in the main directory. That file will not appear on the screen when the directory is listed. The advantages of this are obvious. Since the name of the file can't be seen, it's not likely anyone will be able to access it. It will be protected from accidental damage by novice users and from access by intruders, because they will not know where to find it unless an authorized person tells them. To enhance separation of duties and internal control, only the specific names of hidden files or directories required in an employee's job-related tasks need be disclosed. For example, staff responsible for payables would know the names of specific payables files but not of the receivables files. In general, the only way to hide a file or directory is by using a disk utility program such as Professional Master Key Utilities, Norton Utilities or Mace Utilities. (See the software products listing on page 86). These programs are inexpensive and easy to use because they are menu-driven and accomplish tasks that cannot be performed with DOS commands alone. All utility programs will be slightly different, of course, but the basic methods for hiding a file will be the same: Access the utilities program and call up the files in any given directory. The program will display a menu of the file's attributes. These are its special characteristics and are not to the user. One of these is the hidden/visible option. When the file(s) to be hidden has been located, the attribute can be changed simply from visible to hidden. While hiding an entire file or a directory name is helpful, hiding a single character within a file or directory name also can be effective. Creating a file or directory with a single invisible character embedded in its name can make the file or directory difficult to access. For instance, to protect a certain directory with several accounting data files in it, an invisible character could be hidden in the directory name. Although the directory would be on-screen, most users would not know how to gain access to it because they would not know about the hidden character. Embedding hidden characters in file or directory names simply requires using DOS's ALT 255 invisible character capability. …" @default.
- W73539845 created "2016-06-24" @default.
- W73539845 creator A5033968797 @default.
- W73539845 creator A5053752643 @default.
- W73539845 date "1990-06-01" @default.
- W73539845 modified "2023-09-27" @default.
- W73539845 title "Microcomputer Security and Control: Six Inexpensive and Simple Techniques" @default.
- W73539845 hasPublicationYear "1990" @default.
- W73539845 type Work @default.
- W73539845 sameAs 73539845 @default.
- W73539845 citedByCount "0" @default.
- W73539845 crossrefType "journal-article" @default.
- W73539845 hasAuthorship W73539845A5033968797 @default.
- W73539845 hasAuthorship W73539845A5053752643 @default.
- W73539845 hasConcept C111472728 @default.
- W73539845 hasConcept C111919701 @default.
- W73539845 hasConcept C132090242 @default.
- W73539845 hasConcept C136764020 @default.
- W73539845 hasConcept C138885662 @default.
- W73539845 hasConcept C165005293 @default.
- W73539845 hasConcept C2777683733 @default.
- W73539845 hasConcept C2780586882 @default.
- W73539845 hasConcept C38652104 @default.
- W73539845 hasConcept C41008148 @default.
- W73539845 hasConcept C71745522 @default.
- W73539845 hasConcept C76155785 @default.
- W73539845 hasConcept C77088390 @default.
- W73539845 hasConceptScore W73539845C111472728 @default.
- W73539845 hasConceptScore W73539845C111919701 @default.
- W73539845 hasConceptScore W73539845C132090242 @default.
- W73539845 hasConceptScore W73539845C136764020 @default.
- W73539845 hasConceptScore W73539845C138885662 @default.
- W73539845 hasConceptScore W73539845C165005293 @default.
- W73539845 hasConceptScore W73539845C2777683733 @default.
- W73539845 hasConceptScore W73539845C2780586882 @default.
- W73539845 hasConceptScore W73539845C38652104 @default.
- W73539845 hasConceptScore W73539845C41008148 @default.
- W73539845 hasConceptScore W73539845C71745522 @default.
- W73539845 hasConceptScore W73539845C76155785 @default.
- W73539845 hasConceptScore W73539845C77088390 @default.
- W73539845 hasIssue "6" @default.
- W73539845 hasLocation W735398451 @default.
- W73539845 hasOpenAccess W73539845 @default.
- W73539845 hasPrimaryLocation W735398451 @default.
- W73539845 hasRelatedWork W1153707708 @default.
- W73539845 hasRelatedWork W154910660 @default.
- W73539845 hasRelatedWork W2185952084 @default.
- W73539845 hasRelatedWork W2197528314 @default.
- W73539845 hasRelatedWork W223917692 @default.
- W73539845 hasRelatedWork W2254045973 @default.
- W73539845 hasRelatedWork W23220037 @default.
- W73539845 hasRelatedWork W2331140880 @default.
- W73539845 hasRelatedWork W2337887295 @default.
- W73539845 hasRelatedWork W2479498437 @default.
- W73539845 hasRelatedWork W2550281380 @default.
- W73539845 hasRelatedWork W2943604551 @default.
- W73539845 hasRelatedWork W2993493137 @default.
- W73539845 hasRelatedWork W3143066514 @default.
- W73539845 hasRelatedWork W47994957 @default.
- W73539845 hasRelatedWork W51676474 @default.
- W73539845 hasRelatedWork W820716841 @default.
- W73539845 hasRelatedWork W2282833806 @default.
- W73539845 hasRelatedWork W2876577854 @default.
- W73539845 hasRelatedWork W992397234 @default.
- W73539845 hasVolume "169" @default.
- W73539845 isParatext "false" @default.
- W73539845 isRetracted "false" @default.
- W73539845 magId "73539845" @default.
- W73539845 workType "article" @default.