ACCT6001: Report on Employee Database, IT Controls, and Ethical Issues

Verified

Added on  2021/06/17

|5
|600
|96
Report
AI Summary
This report focuses on the implementation of an employee database using a Relational Database Management System (RDBMS), specifically within MS Access. It explores the advantages of using a database system over a file system, emphasizing features like data security, query building, and backup/recovery. The report highlights the importance of IT controls, including data integrity, database security, and user access control, to maintain database integrity and security. Furthermore, it addresses ethical, privacy, and security issues, such as employee email monitoring, website blocking, and the use of key loggers. The report also mentions security and privacy techniques within RDBMS, like access limitations, firewalls, antivirus programs, and encryption methods. The report is supported by references to relevant sources, including a discussion on Entity Relationship Diagrams (ERD) and IT audit planning.
Document Page
ACCT6001 Accounting Information Systems
Database Application
Student ID –
Date -
Module Tutor -
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Report
Introduction
The report is presenting the implementation of employee’s database.. The database is
implemented in the Relational Database Management System (RDBMS). The database for
employees is built in the MS Access.
MS Access is suitable for large and small both types of data. It is easily affordable also. The
report is describing the IT Controls, Privacy, Security and Ethical issues also.
Database Usage
The database is being used in all organizations over File System as it is easily affordable and has
lot of good qualities over File System. The Relational Database Management System (RDBMS)
is best choice for organizations because of the following reasons-
- Database security options
- Data performance analysis
- Access control
- Query building tools
- Report building tools
- Backup/recovery techniques
All features are very important to implement the database. The database required different
reports, compiled data to fetch to decrease the consuming time etc. All these features are
available in the Relational Database Management System (RDBMS).
Document Page
ER Diagram
(Gabry EI O. 2016)
Document Page
IT Controls
IT Control is very important in every database. It is the main concern for every Relational
Database Management System (RDBMS). IT Controls are required to maintain the database
integrity, database security, database safety etc.
There are so many IT Controls. Some of the IT Controls are below-
Data Integrity: it is sued to maintain the data properly. It helps to remove redundant data.
Database Backup and Recovery: this is very important. It helps in losing the data accidently.
Database Security: It is also one of the most important IT Controls. It helps in securing the
database by restricting the users on different parts of the database.
User Access Control: It is the IT Controls that helps in securing the data from malicious users.
The critical area of the database is restricted from users to secure the entire database.
(Infosec Resources. 2018)
Ethical, Privacy and Security Issues
Ethical Issues
There are so many ethical issues arising in the industries as it is very important for the
information security of the companies. Following ethical issues are very much in use-
- Email checking of employees without informing to check their emails. It helps in getting
known about their information passing from outside world.
- Block the sites that are under doubt. No employee can interact with these sites.
- Apply key loggers on the employee’s machine to know their writing text etc. It is the
great help in securing the important data.
Security and Privacy Issues
There are lot of security and privacy techniques in the Relational Database Management System
(RDBMS) like below-
- Limit the access features of the user’s accounts.
- Make one admin that is allowed to access all points only.
- Apply firewall on user’s machine to restrict the unauthorized sites.
- Use antivirus programs to secure all the information.
- Use encryption/decryption techniques to store important information.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
Gabry EI O. (2016). Database – Modeling: Entity Relationship Diagram (ERD) (Part 5).
Retrieved from https://medium.com/omarelgabrys-blog/database-modeling-entity-
relationship-diagram-part-5-352c5a8859e5.
Infosec Resources. (2018). IT Auditing and Controls – Planning the IT Audit. Retrieved from
http://resources.infosecinstitute.com/itac-planning/
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]