General Control Vs Application Control
General Control Vs Application Control
General controls apply to all computerized systems or applications. They include a mixture of
software, hardware, and manual procedures that shape an overall control environment. In
contrast, application controls are specific controls that differ with each computerized application.
Types of General Control
Software controls - Monitor the use of system software and prevent unauthorized access
of software programs, system software, and computer programs. System software is an
important control area because it performs overall control functions for the programs that
directly process data and data files.
Hardware controls - Ensure that computer hardware is physically secure and check for
equipment malfunction. Computer equipment should be specially protected against fires
and extremes of temperature and humidity. Organizations that are dependent on their
computers also must make provisions for backup or continued operation to maintain
constant service.
Computer operations controls - Oversee the work of the computer department to ensure
that programmed procedures are consistently and correctly applied to the storage and
processing of data. They include control over the setup of computer processing jobs and
computer operations and backup and recovery procedures for processing that ends
abnormally.
Data security controls - Ensure that valuable business data files on either disk or tape are
not subject to unauthorized access, change, or destruction while they are in use or in
storage.
Edit checks (name of control) Input (Type of control) - Programmed routines that can be
performed to edit input data for errors before they are processed. Transactions that do not
meet edit criteria are rejected. For example, data might be checked to make sure they are
in the right format (for instance, a nine-digit social security number should not contain
any alphabetic characters).
Run control totals (name of control) Processing, output (Type of control) - Balance the
total of transactions processed with total number of transactions input or output.
Simple system???
Trojan Horses - These are among the most cunning computer viruses, taking their name
from the massive wooden horse in which the Greeks hid to gain access to the ancient city
of Troy. Trojan horses are programs that are disguised as legitimate programs and are
used by cybercriminals to entice you to install them on your computer. The viruses
acquire access to your computer's files and steal your personal information, such as
passwords and online banking information, once they've been installed. Hackers can then
use your bank account to make online purchases or disclose your personal details.
Overwrite Virus - When it comes to bugs, the Overwrite Virus is at the top of the list.
Overwrite viruses take control of a file and delete the original code without your
knowledge. The original files cannot be restored once they have been erased, and the data
has been gone. They are frequently disseminated via email attachments or online file
downloads, therefore examine files with anti-virus software before downloading and
opening them. This will assist you in detecting these viruses before they might create
difficulties.
Web Scripting Virus - This is a modern-day classic. Web scripting infections are sneaky
small bugs that hide in plain sight on prominent websites, most commonly social media
platforms. They imitate normal links in order to entice you to click on them. They then
steal your cookies like a greedy schoolyard bully. Okay, different cookies — we're
talking about the ones that save your data. Web scripting infections, on the other hand,
should not be treated lightly; they can transmit spam to your system and destroy your
data, and they spread more quickly than most viruses.
Polymorphic Virus - This is a cunning virus. A polymorphic virus, like a chameleon that
changes color depending on the surroundings, changes when it replicates. Most anti-virus
systems struggle to keep up with this. It has complete control over your computer once it
has gained access to it – usually via an email attachment or a download from a
questionable website – and may erase your files, steal your data, and generally ruin your
system. The bad news is that these shape-shifting con artists are becoming more
prevalent. The good news is that top antivirus programs are starting to catch up,
employing more advanced scanning algorithms to catch these chameleons in the act.
Resident Virus - One of the most prevalent sorts of virus you'll (hopefully) encounter,
these sly little squatters intrude uninvited into your computer's memory and make
themselves at home. Consider your previous flatmate's obnoxious friend who would
come over every night and steal your Ben & Jerry's from the refrigerator. Resident
viruses can infect your computer through email attachments, infected downloads, or
shared files, then activate themselves whenever your computer does a certain activity.
They can even attach themselves to anti-virus software, defrauding the exact thing that's
supposed to keep it safe. Is this the best option? Involve a professional.
Multipartite Virus - These adaptable fiends, sometimes known as'multi-part viruses,' are
on the rise. Unlike most viruses, which attack either the computer's central boot region or
its files, a multipartite virus can attack both. Multipartite's fast development rate in recent
years can be attributed to the difficulty of preventing such a flexible virus. They mainly
spread via.exe files, which are found in apps like Word and Excel. How can you know if
you have a multipartite infection on your computer? Because these infections chew up
your virtual memory like nothing else, you should expect a slew of 'your computer has
low virtual memory' notifications and a dramatic slowdown.
Spacefiller Virus - Spacefiller viruses, often known as "cavity viruses," look for empty
spaces in a program's code and fill them in with their own code. They don't change the
size of files in this way (like other viruses do), making them extremely difficult to detect.
Spacefillers elude most antivirus programs, but there are a few manual virus-hunting
techniques that cyber specialists use to discover them. Thankfully, they're not only
difficult to detect, but also to make, and they can only connect to a limited number of file
types. As a result, spacefiller viruses are extremely rare.
Executive Support System - Executive support systems are similar to a DSS but are
primarily used by executive leaders and owners to optimize decision-making. An expert
system helps enterprise leaders find answers to non-routine questions so they can make
choices that improve the company's outlook and performance. Unlike a DSS, an
executive support system provides better telecommunication functionality and a bigger
computing functionality. Graphics software is integrated within an ESS to display data
about tax regulations, new competitive startups, internal compliance issues, and other
relevant executive information. This allows leaders to track internal performance,
monitor the competition, and pinpoint growth opportunities.