Accounting Information Systems Database Report - Security and Ethics

Verified

Added on  2021/05/31

|5
|610
|92
Report
AI Summary
This report provides an overview of database management, focusing on the application of a Relational Database Management System (RDBMS) within the context of accounting information systems. It explores the importance of databases, the features of RDBMS, and the use of IT controls such as access control and data integrity to ensure data security and efficient management. The report also addresses ethical, privacy, and security issues, discussing measures such as restricting access, employing firewalls, and using encryption to protect sensitive data. It references sources on RDBMS and database concepts, highlighting the significance of database management in modern organizations. The report emphasizes the need for robust security and ethical practices to safeguard data and maintain data integrity.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
ACCT6001 Accounting Information Systems
Database Application
Student ID –
Student Name -
Date -
Module Tutor -
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Report
Introduction
The employee project database is being described in the report. The complete database is
developed into the MS Access. MS Access is one the best RDBMS to manage the data
successfully. It provides the features to implement queries, reports etc. that are very useful for
administrators.
Use of Database
The database is very crucial for every organization. It has replaced the old File Systems as it has
so many features that are very important for the database management and security point of
view.
Every organization has to store the data into the Database Management System. There are lots of
features that are provided in the Database Management System which are not available in File
Systems. The data is saved into the Relational Database Management System (RDBMS). The
RDBMS gives the following features-
1. Query Optimization Tool
2. Report Wizard
3. Query Wizard
4. Analysis Tools
5. Safety and Security Features
6. Backup and Recovery Techniques
(Database.guide. 2018)
(Databasedir.com. n.d.)
Document Page
ER Diagram
Document Page
IT Controls
IT Control is used in Relational Database Management System (RDBMS). It works to maintain
the database like below-
Access Control: IT Control is used to manage the access controls in the Relational Database
Management System (RDBMS). It helps in securing the data by restricting some users to access
the important data.
Data Integrity: This feature helps in storing the data in a very efficient manner. By this, the data
cannot be repeated into the database.
Backup and Recovery Techniques: This features provides the database backup and recovery
techniques. In this the user can take the backup of important data and can restore at any time. It
reduces the chances of the loss of the important data.
(Simplicable 2018)
Ethical, Privacy and Security Issues
Ethical Issues
There are so many ethical issues now a day because of increasing hacking techniques and loss of
moral values. The organizations has to do some things to resolve these issues like below-
1. Admin may check the emails of employees on regular basis without their information. It
is necessary for the security of the company’s information.
2. The admin may restrict the sites that are suspicious for the security point of view. No
employee can contact them within the office.
3. The admin can use key loggers on the employee’s system to check their writing text.
Security and Privacy Issues
There are lots of security and privacy issues in the Relational Database Management System
(RDBMS) like below-
1. Access Controls: the user can be given access controls in RDBMS. The user can access
only the authorised portion in the RDBMS.
2. The company does not allow to share copyright information.
3. The company may apply firewall to restrict the unauthorised person to interact within the
organization.
4. Use antivirus at all places.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5. Use encryption and decryption techniques for important data storage.
All the above security and privacy techniques are very important and useful to save the important
detail. It helps in maintaining the critical data with ease.
References
Database.guide. (2018). What is an RDBMS. Retrieved from
http://database.guide/what-is-an-rdbms/
Databasedir.com. (n.d.). What is a database. Retrieved from
http://www.databasedir.com/what-is-database/
Simplicable (2018). 29 Examples of IT Control. Retrieved from
https://simplicable.com/new/it-control-examples
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]