0% found this document useful (0 votes)
6 views

Computer Notes Form 1 4 Booklet

Uploaded by

intoxix345
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Computer Notes Form 1 4 Booklet

Uploaded by

intoxix345
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

INTRODUCTION TO MICROCOMPUTERS

Section I

Objectives

In this section you will learn:

 The Rise and Development of Computers


 Computer Generations
 Characteristics of Computers
 Various Areas of Computer Applications

1.0 The Rise and Development of the Computer

Since the earliest days of civilization man has been preoccupied with
mathematics and logic, and the attempts to create a machine to carry out
calculations on numbers – additions, subtractions, multiplications, divi-
sions – began in the days of the great thinkers of Asia, Greece and Egypt.

The abacus and later mechanical implements were developed, but until
the twentieth century no machine has been invented which could “store”
a sequence of calculations and repeat them as required. Every calculation
needed to be carried out afresh.

It was a Victoria gentleman called Babbage who invented, in the late nine-
teenth century, the first “programmable” computer. That was a machine
built of thousands of intricate geared cylinders interlocked in incredibly
complex ways which could carry out instructions under the control of a
“program” contained in the holes in punched cards – an idea inspired by
the jacquard loom, a card-controlled loom (weaving machine) which wove
extremely complex patterns.

Early in the twentieth century, the idea was developed of stor-


ing the instructions electronically, instead of mechanically, us-
ing valves. That was so successful that the first “real” comput-
ers were built; but the number, complexity and size of their
components were so great that the machine were enormous in
size and cost.
Until the mid-1950’s, computer development and use were
largely confined to a few universities in Britain and the United
States of America, here their main use was the rapid solution of
mathematical and scientific problems.
Gradually computers came to be used more for government administra-
tion and business purposes, but their huge size, cost and complexity lim-
ited their use to only the largest enterprises and institutions.

As transistors replaced valves as the essential components of comput-


ers, medium-size businesses and industries found the sizes and costs of
computers more suited to their needs and resources. As the new comput-
ers were still designed primarily for complex mathematical and engineer-
ing problems, however, operators of the computers still had to be spe-
cially trained to use them, and highly skilled programmers were needed to
produce the results required by the "users".

Soon "thin-film" technology was able to etch many transistorized compo-


nents on a single chip of silicon - the "silicon chip" - giving use the inte-
grated circuit.

Rapid developments in the 1970's provided vast increases in the density


of such circuits which could be packed on to a single silicon chip, with dra -
matic improvements in speed, reliability and versatility - and immense re-
duction in costs. The power and capabilities of a computer, which would
once have filled a whole room and would have hundreds of thousands of
pounds, could now be held in a microcomputer capable of being housed
on a desk and costing well within the financial resources of the average
small business.

In addition to the developments in the size and cost of computes, clear


changes have taken place over the years in the manner of usage of such
computers, and each stage can be clearly defined.

1.1 Computer Generations

The first generation of modern electronic computers was, as has been


described, remote, large, difficult, expensive and - usually - single-pur-
posed, capable of carrying out just one "user task" at a time.

The Second Generation of computers was, however, characterized by


being less large, difficult and expensive, and general-purpose rather than
being dedicated to a particular objective. But such computers were still
somewhat remote, with very scientifically-minded and trained program-
mers being needed to write the instructions for them and highly skilled
operators being needed to control the running of them. Most importantly,
they were still capable of carrying out a succession of single user tasks
(often described as operating in a 'batch processing mode'). Such equip-
ment became known generally as mainframe computers.
The third generation of computers became known as mini-computers.
(Smaller and cheaper than the huge mainframe, )They continued the
trend, too, of making the actual programming part of getting the machine
to perform something useful - which is, after all, the whole purpose of
computers and computing - much more "approachable". Gradually pro-
gramming languages were developed which became more easily available
for many people who were not trained computer scientists to learn; and
computer programming became a skill, which many people with the nec-
essary level of ability could learn and use.

The fourth generation (Microcomputers) in this family of decreasing


size and increasing power. They were, in fact, a development in concept
from the hand-held calculator, which in its early days had the disadvan-
tage of not being able to store and repeat complex instructions (or pro-
grams). At first the microcomputer appealed only to the "hobbyist", who
purchased it in "kit" form to build, smaller to hi-fi, radio and television
equipment.
Then the fascinating of programming – of actually being able to instruct
this electronic machine to do something useful and variable – began to
take hold. It was very soon realized that here was a means of carrying out
“personal” or even “small business’ computing applications at a price af-
fordable for the first time by a whole range of people who never before
had been given that opportunity.

As micro-computers became more generally available, the demand for


less complex, more easily usable programs grew, and there has been a
steady increase in the number of generalized programs which can, within
limits, be adapted to meet the requirements of individual businesses. Use
of these program packages, avoids the very high costs of writing pro-
grams for each user.

The microcomputer, originally produced by International Business Ma-


chines (IBM), but imitated – and is some cases improved upon – by many
other computer manufacturers, has established a ‘standard’ throughout
the business world. Within a relatively short period of time, PC-compatible
micros have appeared on managers’ desks, offering a wide range of facili-
ties never before available in such variety and breadth. Equipment and
programs compatible the “PC standard” have proliferated, taking full ad-
vantage of the ease of transfer now available between one PC-compatible
computer and another.

The speed of developments in the computer industry is so breath-taking


that it is almost impossible to keep up to date with it. Every month new
and exciting inventions and enhancements are being announced, and ex-
plored and developed.

The portable computer, which fits into a briefcase or on a lap, with its own
screen, keyboard and mini-printer, is available in a variety of forms. Many
micro-computers use a “mouse” – a hand-held remote control box, to
move an arrow around the screen to instruct the computers are a reality,
with only the cost of these newer features limiting their wider popularity.
Modern microcomputers can produce pictures, graphs, charts, play tunes,
as well as undertake many necessary administrative and clerical func-
tions.

The fifth generation of computers is often mentioned in the news. Major


research in the field of artificial intelligence is continuously under way,
and it will not be too long before computers will be developed which can
“think” more like a human brain. These will be used to make very complex
decisions, based on a huge number of factors, and will eventually come to
the aid of those such as doctors and lawyers, researchers and all those
others who have need to rely on intuition and experience.

Whole areas of uses for computers have yet to be opened up, and the
manager who thinks ahead and who wishes to harness the latest contribu-
tions of technology for the better service of his enterprise, will do well to
keep in touch with the rapid developments of the computer world.

1.2 Characteristics of Computers

This following summary will give you an insight into many ways in which
the use of computers can improve the efficiency of management in the
Armed Forces, and of many businesses, whatever their sizes.

Speed – Computers work at incredible speeds, performing hundreds,


thousands, even millions of calculations in a second. The speed at which
electrical signals pass within the computer’s “brain” is approximately the
speed of light. It is this speed, measured in terms of microseconds (mil-
lionths of a second), or even in nanoseconds (thousand-millionths of a sec-
ond), which enables the provision of instant information, for example, on
tomorrow’s weather, today’s flight bookings, this year’s sales by depart-
ment – answers within seconds whereas previously considerable research
and manual documentation might have been necessary.

Storage and Retrieval of Information – Computers can store vast


quantities of information, which they can “sift” through when so in-
structed. They can then present relevant details of that information, ex-
actly in the format required, within seconds.

Diligence – Computers, unlike frail human beings, do not become bored


or tired or lose concentration when performing highly repetitive work. If a
computer has to perform a certain calculation on a million numbers, it will
calculate the first and the last with equal diligence. This enables trust to
be placed in the results generated by computers, and confidence to be re-
placed in their ability – neither of which can always be replaced in hu-
mans!

Accuracy – The computer is capable of doing only what it is told to do. If


the human beings who design a given application make a mistake, in in-
voicing customers for example, then it is hardly fair to “blame” the com-
puter, when correctly programmed computers are far more accurate than
human beings. It must be remembered always that computers are only
machines to be used by humans, as are typewriters, calculators, etc., and
the results produced by computers are only as good as the skills of those
who designed and operate them.

There is a phrase well known to computer users: “GIGO”, which


means “garbage in, garbage out”. In other words, if rubbish is fed
into the computer, the results will be rubbish too. It is therefore, for
the user to ensure:

 That information being fed into the computer is always accurate,


well organized and clear.
 That the programs chosen to run the computer are the ones neces-
sary to give the desired result(s).
 That the people who are to operate the computer have the right lev-
els of skill and ability.

It cannot be emphasized enough that computer is NOT a replacement for


human competence. It is an office machine, an aid to administration and
management, and as such it is only as good as the people who use it.

1.3 Various Areas of Computer Applications

 Accounts receivable, payable, sales, purchases, nominal ledger, aged


debts, balance sheets, profit and loss statements
 Payroll and cheque printing
 Stock control, finished goods, re-order highlighting, on-self reports,
stock levels.
 Mailing lists, customer lists, letter writing, invoice reminders, credit
control.
 Sales analysis, sales commission statements and lists, prospect high-
lighting.
 Cash flow control and analysis.
 Manufacturing and production control, work scheduling, time costing,
shop floor loading.
 Order entry, sales order processing, back-order reports, credit reports,
customer billing.
 Monitoring overdue accounts, identifying profitable and unprofitable
accounts.
Section II

Objectives

In this section you will learn:

 Definition of a Computer
 Classification of Computers
 Types of Computers
 Parts of a Computer System
 How a Computer System Works
 Computer Programming Languages

2.0 Definition Of A Computer

A computer is an electronic machine or device


that accepts data (raw facts) from an input device,
performs arithmetical and logical operations (pro-
cessing) in accordance with a stored pre-defined
program and finally transfers the processed data
(information) to an output device.

The above definition will be under-


stood excellently when we come to il-
lustrate how a computer system works
later in this section.

2.1 Classification of Computers

All electronic computers are basically the same in their functional design.
The main essential differences are in four categories:

 Cost
This refers to the initial and maintenance cost which is deter-
mined by the technology involved and the accompanying facili-
ties, e.g. the power of processing.

 Functional performance
This refers to the capability of the CPU to handle input data and
instructions to generate information to the recipients.
 physical size
This is influenced by the computer generation.
 Storage facility
The storage facility is influenced by the type of media that the
computer supports and/or information to be stored.
2.2 Types of Computers

Basically, there are three main types of computers. These are:

 Mainframe computers
Mainframes are large computers with almost unlimited power
allowing many users access to them simultaneously. They
have large storage capacity and can perform calculations at
very high speeds.

 Mini-computers
As technology improved, it was possible to design smaller com-
puters especially after the invention of integrated circuits. Mini-
computers were designed for use in a normal office environ-
ment, providing extensive processing power, adequate for
medium sized organizations.

 Micro-computers
Microcomputers (commonly called personal computers, PCs)
are the smallest computers and were intended for use in an of-
fice, fitting on a desktop. Their design is based on large-scale
circuit integration that confines several physical components to
a small element. Their internal memory is smaller than the
mini and mainframe computers and they support limited back-
ing storage media. They are relatively cheaper and are the
most commonly used computers in offices today.

2.3 Parts of a Computer System


There are two basic parts of a computer system namely:

 Computer Hardware.
 Computer Software.

Computer Hardware Components.


The computer hardware comprises of the physical and tangible compo-
nents. They are the parts of the computer that you can see when it is dis-
played. If it is visible, then that is hardware.
The hardware is again divided into two basic parts namely: -

 Central Processing Unit (CPU)


 Peripheral Devices
 Central processing unit (CPU) has a data store, an arithmetic
and logic unit, and a control unit. The storage unit holds data, together
with instructions until it is ready to work on it. The functions of each
unit is as described below:
 Arithmetic Logic Unit (ALU) - Does all arithmetic and
logic operations.
 Control Unit (CU) - Coordinates all activities of the com-
puter and causes an instruction to be fetched and to be ex-
ecuted.

 Main Memory (MM) also called main storage – Stores


data which is to be processed, stores (programs) instruc-
tions and information. The main memory is volatile (it loses
its memory once power is switched off).

 Peripheral Devices are divided into: -

 Input Devices
 Output devices
 Backing Storage

 Input Devices:

 which allow data as well as instructions to be input into


the computer. E.g. Keyboard, Mouse, Optical scanner
etc.

 Keyboard is that part of a computer that allows you to enter in-


formation into the computer. The keys allow you to type informa-
tion into the computer like one would type on a typewriter.

 The Mouse may have got its name from the fact that it looks like
a mouse especially with the long tail coming from one end. This
tail will be attached to your computer, or if the mouse is a cord-
less one, it runs on a battery. A mouse’s primary purpose is to al-
low you to choose what you would like to happen on your screen
without typing. All you have to do with a mouse is point and click
on your choice of instructions.

Keyboard
Mouse

 Output Devices which:


 Collect data and send it out to the user e.g. Monitor,
Printer.

 Monitor is the device that looks like a television set. It where text
and images are displayed on a screen. The monitor has controls
to adjust the quality and contrast of pictures displayed on the
screen.

 A Printer produces paper copies of what the computer has created.


There are several types of printers. They include the following;
- Dot Matrix Printer
- Ink Jet Printer
- Laser Jet Printer
- *Solid Ink Printer
- *Thermal Ink Printer
- *Dye Sublimation Printer

The last three (*) provide high quality colour images and are favourites in
the graphic industry. While all printers will produce images, not all printers
are compatible with all computers and software. Remember to choose a
printer according to your printing needs.

 Backing Storage is a permanent storage device used to store


data, program instructions and information for future use.

We either use Magnetic tapes or magnetic disks to store information


Magnetic disks are commonly used.

Magnetic disks are of two types:

 Hard disk which is fixed into the computer and consists of one or
more large disks permanently mounted on a horizontal spindle ro-
tating at high speed, which can provide very high volume capacity.
They are frequently used when a large amount of data needs to be
stored and accessed rapidly.

 Floppy disk are smaller units of storage, each one consisting of a


flexible plastic material (hence the adjective “floppy”) in a protec-
tive envelope. It is inserted into a special drive attached to the com-
puter. Original floppy diskettes developed in the early 1970s were
8” in diameter. These have progressively reduced in size, first to
5i/4 and now 51/4” and now 31/2”. These disks are cheap and easily
interchanged and stored, so their use has become increasingly pop-
ular, particularly in connection with micro-computers.

Computer Software.
Software cannot be seen even though it comes packaged in boxes that
you can see. Software is a set of electronic instructions that tell a com-
puter how to do the job. It is actually the programs that run the computer.
Some people have described it as the language that the computer uses to
understand what you want it to do.

There are three main types of software, and they are used for different
purposes:

 Tailor-made programs
 Application packages
 Standalone Operating systems

Tailor-made programs, sometimes called Bespoke, are written for “one


specific user”, and to meet “specifically defined needs.” The programs
work for that user ONLY. They will not be of any use to any other organiza -
tion unless its requirements are exactly the same , and its input date is or-
ganized in exactly the same way.

In order to understand this concept, we will use the analogy of buying a


garment. There are many shops that have ready-made clothes. But there
are occasions when no shop has a garment that fits a customer’s specifi-
cation. In such a case, the customer goes to a tailor who makes a custom-
made garment. The garment suits his exact needs. His needs may not
suite anyone else unless similar specifications prevail.

The advantage of tailor-made software – provided that it is well written –


is that it does “fit the bill”, and provides exactly the solution which is re -
quired for that user-organization’s problems.

The disadvantage is that because such software is so specialized, it is ex -


pensive to design and to develop. In other words, a great deal of time has
to be “invested” in discovering exactly what is needed and in writing ev-
ery program to match those needs.
Examples of Tailor- made programs are:
 Payroll system
 Tea stock system
 Accounts processing system

Application packages are groups of programs written for particular types


of usage. For example, most enterprises will have a need for a payroll sys-
tem and an accounts system; many will need a stock control system and/
or a sales invoicing system. In practice, many of the features within each
individual organization’s requirements will coincide with – be very similar
to – those of another organization. A variety of “standard” applications
have therefore been designed and “packaged” to suit a number of users
with similar needs.

Examples of application software are:


» Word processors e.g. Ms-word, Word Perfect
(deal with manipulation of textual information)
» Spreadsheets e.g. Ms-excel, Quatropro
(deal with production of business financial statements and cal-
culation of figures)
» Database e.g. Dbase, Ms-access, Paradox
(deal with record keeping, data manipulation and sharing).

Standalone Operating Systems are designed to manage the resource of a


computer and control its interface to other systems. Such operating sys-
tems are held in the processor memory during the whole of the time that
the computer is being used. It supervises the execution of programs, as-
signs and controls the use of available hardware, monitors the flow of data
and, in some cases, decides which programs are to be operated at certain
times.

The operating system can perhaps be compared to the system of roads


and traffic regulations without which it would be impossible to travel. If we
regard the car or automobile as the hardware of the system and the
planned journey as the function of the software, then we can see that the
possibility of the journey depends primarily on the existence of a road sys-
tem and on the observance of basic traffic conventions. For example, ve-
hicles must travel on the same side of the road in each direction, must ob-
serve certain speed limits etc.

There are several well-known and commonly used operating systems


which operate on a range of micro-computers, and which enable a wide
choice of packaged software to be run on those computers. Among them,
are MS-DOS, PC/DOS, OS/2, UNIX, XENIX, MS Windows and many more.

Included in the standalone operating systems are utility programs, which


serve to simplify the operation of the complete system. Example of these
programs would be Antivirus programs (Dr. Solomon’s toolkit, Fprot),
Compressing and decompressing programs, back-up programs, etc. Such
utility programs do the following:

 Perform maintenance routines in the computer e.g. formatting


routines, file copying routines, back-ups, file protection routines,
housekeeping routines etc.
 They translate other programs into machine sensible form e.g.
translators & compilers.
 They issue error messages to the VDU screen or printer when
faults occur.

Features of good Software

Whatever the language in which a set of programs may be written, their


most important features are

» That they should work without errors.


» That they should be totally reliable.
» That they should do the job required of them.
2.4 Computer Programming Languages

There are three main categories of programming languages:

» Machine language

» Low-level language

» High-level language

Machine language

All instructions to the computer are given in strings of 1’s and 0’s, using
the binary number system known as “machine code”. The reason for us-
ing the binary number system is that, as an electronic machine, the com-
puter can respond only to two conditions whether transmitted by valve,
transistor or integrated circuit.

Low-level languages (Assembly languages)

Low-level languages are written in symbolic form, with one machine in-
struction corresponding to one written instruction. Instead of using ma-
chine code operation numbers, the programmer is able to use easily
learnt and understood operation mnemonics (i.e. ADD, SUB, MULT, etc.)
and symbolic operands (names allocated by the programmer and used to
refer to particular data areas in the program) to replace numeric oper-
ands.

Although programming is now made easier, the symbolic language must


be translated into the machine code which ‘works’ on a particular com -
puter. This can be done manually, but computer manufacturers will supply
an assembler program, which translates the operation mnemonic and re-
places the symbolic operands by the precise storage location address re-
served for them. The low-level language source program is thus assem-
bled into the machine code object program; the process involves transla-
tion, allocation of storage space and the picking of grammatical and logic
errors.

High-level languages

High-level languages have extensive vocabulary of words and symbols


used to instruct a computer to carry out the necessary procedures, re-
gardless of the type of machine being used. High-level languages are de-
signed for interactive use via a terminal and they provide facilities for the
programmer to make corrections and/or changes to his program during its
compilation and execution.

High-level language program has to be translated into machine code be-


fore it can be used. This is done by a compiler program which compiles
the source program into the object program. It translate words much
closer to ‘real’ language into machine code and back again, so that the
English-speaking programmer could write programs in words which are
meaningful in English, such as ‘READ’, ‘ADD’, etc.; the French program-
mer could use similar words in French, and so on.

Today, mainly ‘high-level’ languages are used, in particular for micro-com-


puters, the best known among them are:

» COBOL (Common Business Oriented Language) - used mainly


for business applications.

» FORTRAN (Formula Translation) - for scientific and mathemati-


cal uses.

» BASIC (Beginners All-purpose Symbolic Instruction Code) – is


an easy language to learn and is widely used in educational estab-
lishments and in time-sharing applications.

2.5 How A Computer System Works


Having mentioned the basic parts of a computer system and their brief in-
dividual functions, it is significant at this juncture to put them together
and assimilate how a computer system actually works.

In order to be able to appreciate how a computer system actually does it


is essential to examine the various “activities” which are involved in the
manual performance of a fairly simple and straightforward routine office
task.

Scenario
 A retail stationery business employs a clerical assistant to complete
sales invoices before sending them to customers. Each completed invoice
is to contain the name and address of the relevant customer, plus the
quantity, description and catalogue number of each item of goods pur-
chased on credit by that particular customer. The assistant’s function is to
look up the unit price of each item in the relevant price-list, and then to
calculate the total cost by multiplying the quantity purchased by the unit
price. He has then to write the total cost for each entry on the invoice, and
must finally add up the total invoice charge and write that in the appropri -
ate place on the invoice.

Explanation

 Reading the item catalogue number and quantity stated on the in-
voice, i.e. receiving new information. (input)
 Looking up the item unit price in the price-list, i.e. referring to infor-
mation already recorded or stored. (main storage)
 Calculating the total entry cost. (arithmetic)
 Writing the total cost on the invoice. (output)
 If there are no more entries, calculating and writing the total invoice
charge; if there are more, repeating the sequence again. (logic)

A simple outline procedure is as shown in the diagram below.

A SIMPLE PROCEDURE

PRICE LIST

STORAGE

INCOMPLETE COMPLETED
INVOICES INVOICES

PROCESSING OUTPUT
INPUT

WORK CARRIED OUT


ACCORDING TO
INSTRUCTIONS
How Data Flows in the Computer System
The above explanation can be amplified further by examining the way
data flows from the moment it is keyed into the computer system and the
time it is available as a as soft copy (at the VDU) or hard copy print out
from any printer.

 From input devices data goes into main memory (main storage) ready
to be processed and the results of processing flow from main storage
to output devices.

 Data flows from main storage to the ALU. The ALU performs operations
on the data thus generating results, which flow back to main storage.

 Data in main storage, which is not required immediately, may be


passed to backing storage from where it may subsequently be brought
back to main storage when needed for processing.

 Instructions (essentially a special form of data) flows from main storage


to control unit, which interprets them and causes the required hard-
ware operations to take place.

 Commands flow from the control unit to other elements of the com-
puter system and are distinct from data flow.

NB: The ALU and the Control Unit form the processor.
Section III

Objectives
In this section you will learn:

 Why Computer Security


 Common Risks and Threats
 Fraud and its Elements
 Computer-related Crimes
 Managing Computer Fraud and security

Computer Security and Fraud

 Physical Security (Hardware)


 Data Security

3.1 Why Computer Security

There are many good reasons to justify critical appraisal of security issues
particularly in a highly computerized organization. The use of computers
presents immense benefits to all organizations, and more specifically to
information-based organizations.

The objective of security is to ensure that both hardware and software


continue to operate successfully and provide expected service levels. To
understand why computer security is important, let us examine the results
of poor security. Firstly, the loss of essential irreplaceable data means that
appropriate decisions cannot be made. Secondly, where such data can be
recovered, the cost of reconstruction can be high and time consuming.
Thirdly, if people discover that they can “get away with it”, there will be
all the temptation to perpetuate fraud. All these will result in unnecessary
losses to the organization and create operating difficulties.

Vulnerabilities

The main areas of vulnerabilities are:

 Processors – is vulnerable to failure and misuse of privileged instruc-


tions. The software of the central processor is vulnerable to bypassing
of file protection and access control programs or falsification of user
identification.
 Storage devices – are vulnerable to unauthorized copying of stored in-
formation and theft of removable electronic data processing media
and to hardware or software failure that could result in compromise.
 Communication facilities – can be compromised by undesired signal
data emanations, cross-talk between secure and insecure circuits and
the insinuation of technical surveillance devices.
 Users – may misrepresent or gorge their identification or authorization,
may seek unauthorized access to sensitive material by rousing; and
can use debugging procedures to circumvent security mechanisms.
 Remote terminals – can produce undesired signal data emanations,
they are vulnerable to technical surveillance devices, and they can
produce a potentially compromising text in the form of hard copy or as
permanent images on platens or ink ribbons.
 System personnel – have normal access to supervisor programs, ac-
counting files, system files, protective features, core dumps, and files
stored on removable electronic data processing media and, if they are
not loyal and reliable they can become serious security risks.

3.2 Common Risks and Threats

 Deliberate sabotage
 Fire and other hazards
 Through equipment failure
 Operator negligence
 Unauthorized access to computer systems.
 Password exposure
 Insufficient security
 Virus and malicious codes
 Unauthorized access to computer network

In analyzing the security problems of a modern computer environment


and seeking solutions to those threats, an overall view is useful. It can tell
us in general where we are, what we are up against, and what resources
are available to us for defence. But it is unfortunate that most organiza-
tions ‘gain confidence’ and think that security measures are too costly
and are bad for the morale of their employees. This ‘negative attitude’
breeds a culture for FRAUD to take up roots.

3.3 Fraud and its Elements

Why fraud occur

Fraud can be defined as a dishonest business transaction aimed at a fi-


nancial gain to the fraudster and a subsequent loss to the victim. It is an
act of stealing. It generally takes place because there is opportunity (ac-
cess, skill, and time) and motivation (need, justification and challenge) to
commit it.

Why fraud can easily take place

 Trust and greed


 No victim awareness till very late
 Official reaction differ
 Low penalties due to the fact that proving the case beyond reasonable
doubt is not easy
 High profit compared to the low risks involved
 There is unwillingness to report because of:

 Embarrassment to self
 Embarrassment to organization
 Some thing that police cannot help

Fraud warnings

 Autocratic line management - a forceful (domineering) person can ex-


ert authority to his/her status. This may allow controls to be over-rid-
den or favourable information to be suppressed: conditions essential to
the concealment of many frauds. This problem sometimes arises where
an individual sees himself as the driving force behind a business and
start to behave more as owner than manager.
 Low morale – low staff morale is conducive to fraud. Unhappy staff are
less likely to operate controls effectively and may cut corners. If for ex-
ample, a major redundancy plan is in progress or a site is to be closed
there is a risk that staff may avenge themselves at the expense of the
company.
 High staff turnover – high staff turnover may indicate disquiet at fraud-
ulent activity or the way the business is managed and a reluctance to
continue working under such conditions. Departing employees should
always be debriefed by someone independent of their line manage-
ment.

Rule: watch for the signs of increased risk and investigate.

Fraud alerts

Fraudsters often test a fraud by making several small deniable or inconse-


quential attempts before a single large transaction. Detection of small
frauds may indicate more substantial attempted fraud. It is therefore vital
to react quickly and effectively to fraud alerts. Common fraud alerts are:
 Anonymous letters
 Lifestyle
 Untaken holidays
 Unusual, irrational or inconsistent behaviors.

Rule: recognize and investigate all fraud alerts.

3.4 Computer-related crimes

The concept of computer crime is necessarily founded on new and differ-


ent concepts from those of traditional crimes. This is because the patterns
of conduct treated as misuse or abuse differ, to a great extent, from those
of traditional crimes. Computer crime is understood by legal scholars to be
antisocial activity related to computer systems.

This broad concept can be concretized by surveying the circumstances re-


lated to the commission of computer crimes and by classifying the crimes
themselves. Many classifications have been attempted, but most com-
monly they fall into five categories:

 Manipulation of data – e.g. false account numbers, changing values


through written input documents, altering cheques, values, names or
account numbers.
 Unauthorized computer use – gaining access to confidential infor-
mation and changing it. Most common types of computer fraud are in
payroll systems, the internal transfer of funds in customer accounts, in-
ventory ledgers etc. this is usually done by creating ghost employees,
stock, items, customers, etc.
 Computer sabotage – malicious damage to computer hardware or
software programs. This may occur if there is a motivation, eg. Justifi-
cation, revenge etc.
 Computer theft – this may include theft of information and computer-
related assets.

3.5 Managing Computer Fraud and Security

The protective features that computer security shares with other kinds of
security consist of administrative and organizational measures, provisions
to ensure the loyalty and reliability of personnel and traditional physical
and environmental safeguards.

The protective features involve measures relating to hardware, software


and communications if a remote environment is under consideration. The
underlisted are some of the measures, which can be enforced to ensure
fraud does not occur and also maximum security prevail.
 Establish authority
 Establish fraud policy
 Ensure loyalty and reliability of employees by doing the following:
 Segregation of duties
 Delegation of duties
 Rotation of duties
 Pre-employment screening (vetting)
 Education (exposure)
 Establish means whereby authorizing actions may clearly be recog-
nized as valid.
 Identify assets deserving protection
 Count your protected assets
 Concentrate your valuable assets so that they can be protected
 Reduce exposure of protected assets
 Document actions affecting protected assets
 Investigate all discrepancies
 Punish deviations
 Fix responsibility for protected assets
 Accounts must be analyzed and reconciled
 Variance between actual and budgeted
 Access control software
 Decentralized security administration
 Antivirus products
 Off-site storage of backup files
 Password management
 Network access control
 Computer room security
 Dial-up port protection

You might also like