ITEC 1010 Lecture Notes - Lecture 9: Digital Rights Management, Intrusion Detection System, Copyright Infringement
Document Summary
Errors in handling files, including formatting a disk by mistakes, copying an old file over a newer one, and deleting a file by mistake. Inadequate planning for and control of equipment malfunctions. Inadequate planning for and control of environmental difficulties (electrical and humidity problems) Installing computing capacity inadequate for the level of activity. Failure to provide access to the most current information by not adding new web links and not deleting old links: some useful policies to minimize waste and mistakes. Changes to critical tables, html, and urls should be tightly controlled, with all changes documented and authorized by responsible owners. A user manual should be available covering operating procedures and documenting the management and control of the application. Each system report should indicate its general content in its title and specify the time period covered. The system should have controls to prevent invalid and unreasonable data entry.