Quote

Accountancy students have a life. Studying is the first on the list and some are lucky to have anything else on it.

Saturday, 2 February 2013

Discuss Briefly Two(2) Types Of Active Threats Creatively And Innovatively

hey and assalamualaikum everyone,

In this entry, I would like to explain on the active threats. The meaning of threats is a potential exploitation of vulnerability. There are two categories of threats which is active threat and passive threat. But for today, I would only cover two types of active threats only. Therefore,I have choose to give explanation on data theft and also sabotage.

1) DATA THEFT
Data theft is a growing problem primarily perpetrated by office worker with access to technology such as desktop computers and hand-held devices capable of storing digital information such as USB flash drives, iPods and even digital cameras. Since employees often spend a considerable amount of time developing contacts and confidential and copyrighted information for the company they work for, they often feel they have some right to the information and are inclined to copy and/or delete part of it when they leave the company, or misuse it while they are still in employment.

While most organizations have implemented firewalls and intrusion-detection systems very few take into account the threats from the average employee that copies proprietary data for personal gain or use by another company. A common scenario is where a sales person makes a copy of the contact database for use in their next job. Typically this is a clear violation of their terms of employment.












2) SABOTAGE
Sabotage is a deliberate action aimed at weakening another entity through subversion, obstruction, disruption, or destruction. In a workplace setting, sabotage is the conscious withdrawal of efficiency generally directed at causing some change in workplace conditions. One who engages in sabotage is a saboteur. As a rule, saboteurs try to conceal their identities because of the consequences of their actions. For example, whereas an environmental pressure group might be happy to be identified with an act of sabotage, it would not want the individual identities of the perpetrators known.






Here, I will attach some video related to data theft and sabotage. Do watch and enjoy. But take it as a lesson. Not for doing it for your own good. 

DATA THEFT

Data theft right before your eyes. 


Smartphone hackers: Data theft protection by Swiss banks




SABOTAGE

Windows XP hardware sabotage trick with notepad.






How to Sabotage a Computer (No Tools Needed)






*All pictures are credited to Google image while all videos are credited to Youtube*



Briefly explain TWO(2) types of intruders creatively and innovatively

hey and assalamualaikum everyone,

Today I am going to tell you a little bit on what intruders is all about. This is the theory part that we had learned a week after our mid semester examination that ends on the second week of January. And as usual, at the end of this entry, there would be a few video related to the types of intruders that I am going to explain later.

First of all, I would like to define what is intruder. Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data on that system. In summary, this person attempts to violate security by interfering with system availability,data integrity, or data confidentiality. But we should remember that, hackers are one of the intruders that is used in popular media to describe someone who attempts to break into computer systems. typically, this kind of hacker would be a proficient programmer with sufficient tehcnical knowledge to understand the weak point in a security system.

Other than that, we also have many other types of intruders such as, unnoticed intruders,wiretappers, piggybackers, impersonating intruders, and eavesdroppers. But for this entry, I would explain in details only for two types of intruders that I have choose which is, WIRETAPPERS and PIGGYBACKERS.

1) WIRETAPPERS
A large portion of the information processed by the company's computers travels over wires and cables. some information is transmitted only from one room to the next, and other information may be transmitted across the country via the Internet. These lines are vulnerable to wiretapping , which may be done with even inexpensive devices, for example simple tape recorder and a short piece of wire, that are capable of performing the task without giving any clues that the wire is being tapped.

*This is how wiretapping works on the telephone*

*This would be the part of wiretapping equipment which includes electronic bugs,voice activated.




*And this would the details on the secret of wiretapping*

2) PIGGYBACKERS
The most sophisticated intruders of wire tapping is called piggybacking. With this method, the penetrator intercepts legitimate information and substitutes fraudulent information in its place. 

A customer of a business providing hotspot service such as hotel or cafe, is generally not considered to be piggybacking, though non customers or those outside the premises who are simply in reach may be. Many such locations provide wireless internet access as a free simply to draw people to the area. Others near the premises may be able to gain access. The process of sending data along with the acknowledgment is called piggybacking. 

*This shows the connection on piggybackers process*

So here is the video that I have said earlier. Do watch and enjoy!


*How to Hack wireless*

*How to know whether your cellphone is being tapped*




*All pictures are to be credited to Google image, Yahoo image, and the video is credited to Youtube.

Monday, 10 December 2012

Choose ONE ( 1 ) business entity . Give example for each of the PRIMARY business processes ( 5 ) and SUPPORTING business processess ( 4 )

hey and assalamualaikum everyone,

Today I am going to tell you about some of  the theory part for Accounting Information System that we have learned last week with Sir Noreffendy. It is all about what are includes in each of the business process. So my group decided to discuss in details on Mcdonald's which is our choice of business. 


'Mcdonald's logo.'

'Some products from Mcdonalds'

Before we start to explain any further, the business processes is divided into two group which is PRIMARY BUSINESS PROCESSES and SUPPORTING BUSINESS PROCESSES. So we will update a business processes that related to MCDONALD'S.

So we learned that in Primary Business Processes we have five types which is  :

PRIMARY BUSINESS PROCESSES

A . INBOUND sales logistics 
~ Receiving , storing , distribution of material at the warehouse .

So this would be the place where the raw material of the production will be located before it will be transform to Mcdonald's product. 



*The example of Mcdonald's stores,warehouse or factory that will be keep the raw materials before it becomes finished good for the production*

B . OUTBOUND sales logistics 
~ Distributing , product and service to customers .

Then from the warehouse or stores,they will send those materials needed to each of Mcdonald's franchises,and branch here in our country,Malaysia. And this process is also would be done by other country as well. 

 *The track that will deliver the materials to each branch or franchises.*

*This is the way how the rider will deliver the products or services to the customers in Malaysia and it is called as 'McDelivery' services.'

*And this would be the motorcycle used by the rider for McDelivery in overseas.*

C . OPERATIONS
~ Transforming inputs into products or services .

This would be the process needed in productions in order to transform from RAW MATERIALS to FINISHED GOODS. For example,as for Mcdonald's, they will use a lot of meat and chicken that will be transform to made as the patty.
*This would be the example of inputs of the operations needed in the production of patty burgers. *

*The tranformation process*

 *This would the output of the products that is transform*


D . MARKETING 
~ helping customer to buy the product services of the firm .

Then, in this process,they will plan a strategy to attract customers to buy their products. For example,they might use commercials,promotion,and also free toys with each purchases to attract kids.

*Examples of Mcdonald's promotion*

*Free toys for each purchase of Happy Meal that will attract kids especially. *


*McDelivery commercial for Mcdonalds*


E. Services. 
~ Post sale support provided to customer such as repairs and maintenance function .

This process would be the feedbacks from the customers that will helps in increasing for any incovenient issues and they will upgrading their maintenance function and repairs if there is any damage.


*Both are the example for maintence and repairs*




SUPPORTING BUSINESS PROCESSES

A . PROCUREMENT
~ Buying the resources needed to carry out the entities primary activities .

*The materials needed*


B . HUMAN RESOURCES 
~ Recruiting and hiring new employees 
~ Training , paying salary , employees benefits .

*The management of Mcdonalds*
*Malaysia Mcdonalds Crew*


C . TECHNOLOGY DEVELOPMENT 
~ Activity to improve company products or services
*Mcflurry ice cream machines to mix the ice cream and the toppings together*
*Machines to fried the fries more efficiently and fast*
*And also techonology that creates an idea of Mcdonald's drive thru that using technology for take away purposes*


D . FIRM INFRASTRUCTURE
~ Accountant , lawyer , administrative .

UBS skills I've learned until today are :

hey and assalamualaikum everyone (:

so last two lab classes we had learned a few new skills about the UBS system. Sir Noreffendy do taught us on how to use the UBS system since we are the beginner for this system ( as shown below).


Therefore,in this post,i am going to tell you the skills that we have learned so far in the lab session. And at the end of this entry,you can also watch the video tutorial that i will upload it so that you can get the information more clearly.  And you will get to see the system itself.

In our FIRST CLASS, we were asked by Sir Noreffendy to :

i) Entering the UBS system and we have to click 'ADD' to create a new company and we have to type the company name and also the directory as instructed by our Sir. For example, we type 'saraheiffa05-DIA' for the company name column,and 'ASGN1' for the directory. And both information is actually instruct by Sir himself.

ii)  Then,we have to sign in as Admin and also the password that is already been given to us.




*As you can see on the pic above,we have to login to UBS system by choosing 'ADMIN' and type the password correctly. Beside that we also need to 'CHANGED' the 'DATE' based on our basis year for the transactions.*

iii) Then we will go to Setup Wizard which we will update about the 'COMPANY' details. And after you update the details,you will be directing to the main page of UBS system.

iv) Here,we have to setup the 'COMPANY' again by go to'HOUSEKEEPING' ----> 'SETUP' ----> 'GENERAL SETUP' . By doing this,you will be go to general setup page,where you should write the company names,the address, and all other details.


NOTE:  In this section, you have to be very carefuly on the accounting year. We have to maintain the accounting year because the only part that can be change is on the last accounting year on the closing date (refers to the pictures above)

v) The next step is we have to add on 'CHART OF ACCOUNT' based on the information that we have in our books. So first of all,we have to go to 'GENERAL' ----> 'GENERAL A/C MAINTENANCE' and we will go to that page. Click Add and type the account number,account description and choose the account type and click 'SAVE'

vi) Then we have to add on 'BATCHES OF ACCOUNT' also based on the information that we have in our books. Firstly,we have to go to 'TRANSACTION' ----> 'ORGANIZE BATCHES' and we will go to that page. Click Add and type in the batch no,batch type,tittle until the last batches which is batches seven.


*The picture above shows the 'ORGANISE BATCHES' page.

vii) Our last skills that we learn on the first class is to do backup for our system. After we have done key-in all the information (chart of account and also the batches), we have to do the backup. First of all, we have to go to 'FILE' ----> 'BACKUP' and we will go to that page. Then we have to choose to backup on our C drive and click backup. 




After that, we have to go to our 'MY COMPUTER' which contain the C drive, click the C drive. Then we will see backup files,so click it. And we will see our backup files from UBS system is there. But CAREFUL,dont double click on the backup document because it might lead to system CORRUPTION. So we have to right hand click the document and click rename. Then we have to change the document name to our nickname for example 'backup.saraheiffa05-GC'.

In our SECOND CLASS ,we were learned another skills on UBS system :

i) As usual,we have to Entering the UBS system and sign in as admin and type the password as well and wait until it will be directing to the main page of UBS system.

ii) So the first skill on the second lab session is to restore the file that we had created earlier. Firstly,we have to go to 'MY COMPUTER' ----> 'C drive' ----> 'BACKUP FILE'. Then you will see you backup name document. Now you have to rename the document again to the normal which is from backup.saraheiffa05-GC to backup.acc.

iii) Then back to UBS system, we have to go to 'HOUSEKEEPING' ----> clear files, generate sample chart >> choose options 1 ( to clear both chart of account transactions)

iv) Then only,we can go to 'FILE' ----> 'RESTORE' and choose from C drive and it will be directing to our UBS system account.

v) After that,we have to enter the business transaction either

  • Add entry
  • Quick entry

And for the introduction of it,we learned the basic first which is 'ADD ENTRY' . To add the entry for the business transactions, we have to go to 'TRANSACTIONS' ----> 'TRANSACTIONS FILE MAINTENANCE' . Here we have to type in the details of the transactions which include the date,description and also the amount of DEBIT and CREDIT and click save.

vi) After we saved the business transaction,again we do the backup for the changes  that we have made. The way of backup is as I already wrote earlier. 

Thats it. But before I end this post,I would like to share the video on tutorial how to use the UBS system. Do watch,and enjoy! (:




 *UBS accounting tutorial 1*

*UBS accounting tutorial 2*

*All pictures are to be credit to google.com and all videos are to be credit to youtube.com. Thank you (: *


Sunday, 25 November 2012

My 1st Blog Post Regarding Accounting Information System (DAC0163) Mini Blogging Project

hey,and assalamualaikum everyone (:

First of all,i would like to tell that this blog was created for educational purpose and it is own by Eiffa and Sarah,who will in charge in updating the upcoming entry based on the topics given. Both of us are students that currently taking Diploma In Accountancy(DIA) at Management and Science University(MSU),Shah Alam. 

As i mentioned above,this blog is basically about one of the current subject that we are taking for this long semester on November 2012 session, which is Accounting Information System(AIS). This subject is divided into two parts which is theory and also practical,that will include learning of UBS system. 

On last monday,19th November,it was our first day that we were introduced to the lecturer,Sir Noreffendy Bin Mohamed, who will teach us for this subject. He explained to all of us regarding the assessment for this subject and also told us that every monday class,will be our theory classes and every tuesday classes (For Group C), will be our lab session which we gonna learn about the UBS system.

Then,on Tuesday, 20th November,which is lab session for Group C, Sir Noreffendy did further explained to us on introduction of UBS class. He did gave each of us two piece of paper,which one of it stated the division of assessment,the materials used,the internal MSU-UBS computerized Accounting competition,and our first tutorial, while the other one, mentioned about our first project that related to this blog,which is Blogging Mini Project. So what did you guys know about blogging?


IS THIS WHAT WE CALLED AS BLOGGING? 


To be honest,some of us are not really know or have any experience about blogging,or what is the function of the blog itself. So i guess this could be our best opportunity to learn about blogging since nowadays blogging is famous among the teenagers. And we were happy when we were told that we can do this project with a group of two people because at least we have partner to share this knowledge together.

From my point of view, this project is so beneficial to all of us,the students especially because through blogging we could have a great way for learning, so that the lesson wont be that bored. And that makes us to be more excited to learn the subject itself with an addition of learning something new from blogging. Other than that,we could also have another great experience when we were taught on how to make the blog or the entries more interesting,more colourful,and more informative for others to view or read. This may attract viewers to take a look at our hardworks and give comments. 


Therefore, I would like to say thank you to our lecturer for giving us this chances,and to the fellow classmates happy blogging! 

-Eiffa-

Thursday, 22 November 2012

The Accounting Information System (DAC0163) Disclaimer

This blogging mini project is part of creative and innovative teaching under Accounting & Information System (DAC0163)

All posts made by the owner of this blog is solely for the purpose of discussion and academic learning only and to fulfill the requirement of the mini project Accounting & Information System (DAC0163)

This is a pioneer mini project for Accounting & Information System (DAC0163) and any advantages or disadvantages occured will be taken into consideration for improvement in the future.