µ±Ç°Î»ÖãºÊ×Ò³ > ±ÏÒµÂÛÎÄ¡ª»á¼ÆµçË㻯ϵͳµÄ°²È«ÐÔ·ÖÎöÓë·À·¶´ëÊ© - ͼÎÄ
****´óѧ20**½ì±¾¿ÆÉú±ÏÒµÉè¼Æ£¨ÂÛÎÄ£©
¸½Â¼
The security research of accounting information system
Introduction
Accounting information system enables the traditional accounting process to operate on the computer, which brings the convenience to accountant, but simultaneously overlooks the accounting information system(AIS)security problems which should not be overlooked have emerged£®When people enjoy the convenient of AIS£¬they also bear the security risks£®With
improving of society information£¬the security issues of AIS growing abdomen on£®It is great significance research£¬either for society or for enterprises£¬that How to face the security issues of AIS and how to find effective ways to solve them£®
Information carriers of AIS transform from paper into bits£¬its security problem is one of the most important factor affecting AIS£®There are some discussions on the AIS security£¬but it is mostly from the technical point of view£¬excessively except to solve the problems on computer security and network hardware products and technology£¬and pay little attention to the management system£¬and the information system security assessment£®The giving measures to the net work accounting security is just listed some of the major computer and network security technology£®
1. The security issues
The security of AIS is users most worry about£»the main security risks are the following factors£º
(1)The computer system faults£®All computer systems may have the failures on software£¬hardware£¬or the network itself£®These failures lead to data losses even system paralysis£®
(2)The distortion of accounting information and data£®The quality of accounting information directly affects the management decision¡ªmaking£®The basic requirements of AIS are true complete and accurate£®Once the accounting information system security has been harmed£¬it would cause the accounting data lost or camper with£¬resulting in the distortion of information£®
(3)The security issues of online clearing£®The financial activities on the internet£¬such as online sales£¬online clearing£¬online ordering£¬have increasing under the electronic¡ªcommerce£®The two parts take trading activities simply by virtue of the credibility£¬so the enterprises will have the security issues of financial settlement£®
(4)Ethical considerations about security£®Firstly£¬the ethical factors of the internal staff of the enterprises£®Internal staff fraud or illegal use of accounting data£¬which is caused by unintentional acts£¬may lead important information of the enterprise leaking£®Secondly£¬
13
****´óѧ20**½ì±¾¿ÆÉú±ÏÒµÉè¼Æ£¨ÂÛÎÄ£©
computer victims or net work vicious attack causes the system unable to operate normally£®
The four factors above all constitute enterprise accounting system security risk as an important form£®To ensure the accounting information system security and stability in operation£¬we should establish the necessary security strategy so that AIS can pay better role to serve economic construction£®
2. The strategy to ensure the safety of AIS 2.1 Establish a perfect system of AIS
Establish a perfect system of AIS is the fundamental guarantee to ensure the safe operation of accounting and to provide the accounting information timely and accurately£®Furthermore£¬it is the prerequisite for electronic accounting£®
(1)Establish import control system for accounting information system to provide the basic security guarantees£®Firstly£¬establish accounting confirmed security control£¬through third¡ªparty agencies to recognize the original documents and to confirm the reliability of input information by dynamic digital signature£¬in order to guarantee the accuracy of the data£®Secondly£¬set the input security control of accounting document£¬and minimize human intervention from the original document electrified to accounting receipts electrified to ensure the electronic accounting receipts accuracy and reliability£®
(2)Establish operational control system for the accounting information system to provide operational level security guarantee£®Establish operating authority security control£¬and prevent the problem of ultra authority operation of the system£®Establish strict operational control standards on accounting information systems operation to guarantee system continue operating£¬even if the system itself has abnormal phenomenon caused by lack of development£®
(3)Establish internal supervision and management mechanism for the accounting information system to provide internal security protection£®Establish a corresponding mechanism for the supervision£¬monitoring the use of relevant personnel to ensure that there is no danger of internal accounting information system£¬so as to ensure the AIS operation normally£®Establish corresponding punishment mechanism£¬which the relevant personnel who be punished by mistake to ensure maximum there is no possible internal problems£®All these will protect the authenticity and reliability of the information£® 2.2 Establish the necessary security measures
To ensure the accounting information correctly and reliably£¬we need to create the necessary protective measures expect establishing a sound management system£®In general£¬protection measures can be divided into the following aspects£º
(1)Designate a professional people to manage and maintain the database£®It will ensure the data that AIS interdependent on security and integrity£®Keep the accounting data secret and
14
****´óѧ20**½ì±¾¿ÆÉú±ÏÒµÉè¼Æ£¨ÂÛÎÄ£©
control the authority of people who use the AIS reasonably to ensure database management system safety£®
(2)install an effective firewall and virus¡ªkilling software£®Using technology protection measures£¬such as firewall and identification system£¬shuts network for unauthorized users£¬ensures network security and prevents important information leaking during transmission£®
Regularly update virus database of anti¡ªvirus software£¬scan and kill computer systems within the network for virus to prevent the virus attacks on information systems and accounting database system caused the damage£®
(3)AIS itself should increase security to ensure the system without external aggression or in violation of certain resilience£®
(4)Enhance safety education of AIS user£®System users especially the system operator should establish a sense of safety£¬enhance the knowledge of the computer, communication and network£¬and improve professional quality£®Furthermore they should set good professional ethics£¬consciously abide by the rules and regulations and various operational rules to prevent unnecessary mistakes£®
(5)Establish specialized information management to guide and implement the enterprise informative£®Meanwhile it has responsibility to maintain the network£¬to ensure smooth flow of the network£¬to provide a good network environment for AIS normal operation and necessary maintenance£¬and to guarantee the carriers£®that AIS rely on normally£® Conclusion
Remarks in a complex and ever changing accounting information system£¬only by fully understanding their security needs£¬ensuring effective security control£¬regularly assessing information system security£¬finding is relatively weak£®For the problems£¬give the corresponding solutions and constantly improve the existing security system to ensure the AIS work normally and reliably£®Factors which affect the security of information systems£¬and proposing measures to improve the implementation£¬will it be possible to construct a system£®Only on the basis of the security system£¬Chinese computerized accounting can flourish£®
15
****´óѧ20**½ì±¾¿ÆÉú±ÏÒµÉè¼Æ£¨ÂÛÎÄ£©
»á¼ÆÐÅϢϵͳµÄ°²È«ÐÔÑо¿
¼ò½é
»á¼ÆÐÅϢϵͳÊÇ´«Í³µÄ»á¼Æ³ÌÐò£¬ÊÇÔÚ¼ÆËã»úÉϲÙ×÷£¬Ê¹»á¼Æ¹¤×÷¸ü¼Ó±ãÀû£¬µ«Í¬Ê±ºöÊÓÁ˲»Ó¦ºöÂÔ£¬²¢ÒѾ³öÏÖµÄ»á¼ÆÐÅϢϵͳ£¨AIS£©°²È«ÐÔÎÊÌâ¡£µ±ÈËÃÇÏíÊÜÈϿɻú¹¹µÄ·½±ã£¬ËûÃÇ»¹³Ðµ£Á˰²È«·çÏÕ¡£Ëæ×ÅÉç»áÐÅÏ¢»¯Ìá¸ß£¬ÈϿɻú¹¹µÄ°²È«ÎÊÌâÈÕÒæ¸¹²¿ÉÏ¡£ÕâÊÇΰ´óµÄÒâÒåµÄÑо¿£¬ÎÞÂÛÊÇÉç»á»òÆóÒµ£¬¸ÃÈçºÎÃæ¶ÔÈϿɻú¹¹µÄ°²È«ÎÊÌ⣬ÒÔ¼°ÈçºÎѰÕÒÓÐЧ;¾¶¼ÓÒÔ½â¾ö¡£
AISµÄÐÅÏ¢ÔØÌåÊÖ¹¤ÓÉÖ½ÖÆµÄת»»ÎªµçË㻯»á¼ÆÐÅϢϵͳһ²½µ½Î»£¬ËüµÄ°²È«ÎÊÌâÊÇ×îÖØÒªµÄÓ°ÏìAISµÄÒòËØÖ®Ò»¡£ÔÚAISÉÏÓа²È«µÄһЩÌÖÂÛ£¬µ«ËüÖ÷ÒªÊÇ´Ó¼¼Êõ½Ç¶ÈÀ´¿´£¬³ýÁ˽â¾ö¹ý¶È¼ÆËã»ú°²È«ºÍÍøÂçÓ²¼þ²úÆ·ºÍ¼¼ÊõµÄÎÊÌ⣬²¢²»Ì«ÖØÊÓ¹ÜÀíÌåϵ£¬ºÍÐÅϢϵͳ°²È«ÆÀ¹À¡£¶ÔÓÚ¸Õ¸ÕÉÏÊеĴóÐͼÆËã»úºÍÍøÂ簲ȫ¼¼ÊõÉÏÌá³öÏàÓ¦µÄÍøÂç»á¼Æ°²È«±£»¤´ëÊ©¡£
1.°²È«ÎÊÌâ
ÈϿɻú¹¹µÄ°²È«ÊÇÓû§×îµ£Ðĵģ¬Ö÷ÒªµÄ°²È«·çÏÕÓÐÒÔϼ¸·½ÃæÒòËØ£º
(1) µçÄÔϵͳ¹ÊÕÏ¡£ËùÓеĵçÄÔϵͳ¶¼ÓÐÈí¼þ£¬Ó²¼þ¹ÊÕÏ»òÍøÂç±¾ÉíµÄÎÊÌâ¡£¶øÕâЩ¹ÊÕϻᵼÖÂÊý¾Ý¶ªÊ§ÉõÖÁϵͳ̱»¾¡£
(2) »á¼ÆÐÅÏ¢ºÍÊý¾ÝµÄÊ§Õæ¡£»á¼ÆÐÅÏ¢µÄÖÊÁ¿Ö±½ÓÓ°Ïìµ½¹ÜÀí¾ö²ß¡£ÈϿɻú¹¹µÄ»ù±¾ÒªÇóÓ¦ÊÇÕæÊµ£¬ÍêÕûºÍ׼ȷµÄ¡£Ò»µ©»á¼ÆÐÅϢϵͳµÄ°²È«Êܵ½Ë𺦣¬Õ⽫µ¼ÖÂ»á¼ÆÊý¾Ý¶ªÊ§£¬»òÐÅÏ¢Ê§Õæ¡£
(3) ÍøÉϽáËãµÄ°²È«ÎÊÌâ¡£»¥ÁªÍøÉϵĽðÈڻ£¬ÈçÍøÉÏÏúÊÛ£¬ÍøÉϽáËã£¬ÍøÉ϶©»õ£¬µÈµç×ÓÉÌÎñ¡£ÕâÁ½²¿·ÖËù²ÉÈ¡¼òµ¥µØÆ¾½èóÒ׻µÄÐÅÓþÀ´½øÐÐÍøÉϽ»Ò×£¬Òò´ËÆóÒµ½«²ÆÎñ½áËãµÄ°²È«ÎÊÌâ¡£
(4) °²È«ÐÔÀíÂÛ·½ÃæµÄ¿¼ÂÇ¡£Ê×ÏÈ£¬ÆóÒµµÄÄÚ²¿¹¤×÷ÈËÔ±µÄµÀµÂÒòËØ¡£ÄÚ²¿¹¤×÷ÈËÔ±Õ©Æ»ò·Ç·¨Ê¹ÓÃµÄ»á¼ÆÊý¾Ý£¬ÕâÊÇÔì³ÉÎÞÒâµÄÐÐΪ£¬¿ÉÄܵ¼ÖÂй¶ÆóÒµµÄÖØÒªÐÅÏ¢¡£Æä´Î£¬¼ÆËã»úÍøÂ繤×÷µÄÊܺ¦Õß»ò¶ñ¶¾¹¥»÷µ¼ÖÂϵͳÎÞ·¨Õý³£ÔËת¡£
ÒÔÉÏÕâËĸöÒòËØ¹¹³ÉÆóÒµµÄÖØÒªÐÎʽµÄ»á¼ÆÏµÍ³µÄ°²È«·çÏÕ¡£ÎªÁ˱£Ö¤»á¼ÆÐÅϢϵͳµÄ°²È«ÐÔºÍÔËÐеÄÎȶ¨ÐÔ£¬ÎÒÃÇÓ¦½¨Á¢±ØÒªµÄ°²È«Õ½ÂÔ£¬Ê¹ÈϿɻú¹¹¿ÉÖ§¸¶µÄ×÷Ó㬸üºÃµØ·þÎñÓÚ¾¼Ã½¨Éè¡£
2.È·±£AIS£¨»á¼ÆÐÅϢϵͳ£©µÄ°²È« 2.1½¨Á¢±ØÒªµÄ±£°²´ëÊ©
½¨Á¢ÍêÉÆµÄAISϵͳµÄ¸ù±¾±£Ö¤£¬È·±£°²È«ÔËÐÐºÍ»á¼ÆÌṩµÄ»á¼ÆÐÅÏ¢¼°Ê±£¬×¼È·¡£´ËÍ⣬ËüÊÇ»á¼ÆµçË㻯µÄÏȾöÌõ¼þ¡£
16
¹²·ÖÏí92ƪÏà¹ØÎĵµ