IDEAS home Printed from https://ideas.repec.org/a/nwe/natrud/y2004i1p255-290.html
   My bibliography  Save this article

Internet (Web) Protection of Accounting Information

Author

Listed:
  • Emil Denchev

    (University of National and World Economy, Sofia, Bulgaria)

Abstract

Connection of business to Internet Technologies gives a lot of additional advantages but it leads to some risk. Risk connected with the possibility of unestablishe remote access to shared Accounting Information (AI) and access to the AI send by the connecting channels of company network, based on the Internet. Programmer Methods They include the use of:Password for access to the shared AI on the network. Concerning the passwords, observance of the International Security Standard C2 requirements is recommended, Determination of rights for remote access to the shared AI. These rights are defined on the level of a user (a chief accountant) or a group of users (Accountants, cashiers, material responsible staff, administrators), Archiving of the AI in virtual time – on-line archiving is means of the AI protection from destructions caused by technical reasons. It is carried out on the Internet on a server disk of data, On-live updating of anti-virus programs (Live Update). Companies that have worked out the antivirus programs, offer on-line (live update) files updating with virus definitions, Updating of the operating system (Update). The aim is eliminate the critical punches of the system security, Protective walls (Firewall). They are means of the AI protection in the company computer network, based on the Internet attacks from outside and inside. Virtual Private Networks (VPN). They are used for dependable connection of the company to its branches using the Internet. The aim is to process and send the AI. On-line scan of workplace. It is done on purpose of testing the system security ability. Microsoft Baseline Security Analyzer (MBSA) has been developed on purpose of evaluation of the protection degree of one or more computers from the VPN based on Windows. MSBA determines if the built-in security systems are outdated and had better be updated; Cryptographic Methods Cryptographic methods for the AI protection are applied while sending the information by the connecting channels. One of the technologies for the AI cryptography used in the Republic of Bulgaria is Public Key Infrastructure (PKI). Confidentiality, attestation of senders identify, AI completeness and protection from repetition are realized by this technology. Legal Methods Legal methods for the AI Internet Protection are based on the existing normative base in the Republic of Bulgaria, including: Electronic Documents and Signatures Protective Law, Criminal Procedure Code; Technical Methods Technical methods for the AI Internet Protection include technical methods for access restriction to the AI as: Smart cards. Hardware realized protective walls (Hardware Firewall).

Suggested Citation

  • Emil Denchev, 2004. "Internet (Web) Protection of Accounting Information," Nauchni trudove, University of National and World Economy, Sofia, Bulgaria, issue 1, pages 255-290, May.
  • Handle: RePEc:nwe:natrud:y:2004:i:1:p:255-290
    as

    Download full text from publisher

    File URL: http://research.unwe.bg/uploads/ResearchPapers/Research%20Papers_vol1_2004_No08_E%20Denchev.pdf
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:nwe:natrud:y:2004:i:1:p:255-290. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Vanya Lazarova (email available below). General contact details of provider: https://edirc.repec.org/data/unweebg.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.