Monday 28 January 2013

DISCUSS BRIEFLY TWO TYPES OF ACTIVE THREATS CREATIVELY AND INNOVATIVELY.


Threat is a common thing in life.


Everywhere we go here, there will always be threat. It will occur if there are people having bad intention towards another person. Bad intention frequently happened when a person feels jealous or envy towards another person and feeling of hatred. Threat can also become an activity where person being hired to hurt others in different kind of ways and some of the people feels that being bad is cool so they end up making it as their hobby. One normal example of threat is when a student is having a quiz and the other friend that does not study will try to copy his answers. So whenever there is a threat, we should try to prevent it because it can harm us and bring corruption to the world.


There are many kinds and types of threat in this world such as business threat where business is provoked, friendship threat where a person will back-stab a friend because of jealousy, computer threat which is virus, and threatening of own-self feelings such as pressure and cannot control self-emotion.


In a computer system there are two types of threat which are passive threat and active threat. Passive threat is threats that occur unintentionally such as system down while active threats occur intentionally by humans. Active threats made up of input manipulation, program alteration, direct file alteration, data theft, sabotage and misappropriation or theft of information resources. Two of the most famous active threats are that normally happened in a computer system are sabotage threat and data theft threat.


Sabotage Threat

Sabotage threat is a deliberate action taken with the purpose of weakening an enemy, oppressor, oneself, or employer through means such as obstruction, disruption, or destruction. Sabotage action is different from the violence action because sabotage is a lesser evil action than the violence action. More than that, sabotage can be in a good way and a bad way such as the government will sabotage the intruders that try to hack the government files through online. So sabotage can be used as a defensive tool if there is a threat to the country. At the same time, sabotage can be an immoral action as it is used for the wrong reason to gain self advantage such as send virus to other people’s computer just to have fun or to steal confidential information.

Moreover, there are three types of sabotage which are workplace sabotage, product sabotage and computer sabotage. Workplace sabotage is bad action that is done in the environment of the office or workplace and mostly it is being done by the management, employee and bosses in the firms. Sabotage mostly happens when there are thousands of employees chasing over one promotion such as general manager position that have been state by the company. So the workers will compete between one another for the position and there will come to a state of healthy competition and bad competition where one of it is sabotaging.


Other than that is product sabotage. Product sabotage is an action being practiced by every product disturber to gain profit, procure many customers and kill the competition of distributor that distributes the same product. Every distributor of goods will try the best that they can to achieve their goals even though using neither good nor bad method. When a distributor is eager to own the market, they will drastically do whatever they could until their competitor are all gone and most of the method that they used is hiring a person to sabotage other peoples’ company or production firms. This it to make sure that the firm being sabotage cannot achieve their goals and the entire plan have been stolen. The information stolen will be used by the firm that hired the spy.


Finally, computer sabotage is a deliberate action that compromises the confidentiality, integrity, or availability of a computer. Computer sabotage is an action that is mostly used by a person that has a great knowledge of IT. One of the example of computer sabotage are writing and releasing a virus, worm, sending out spam, initiating a denial of service attack, installing a "back door", altering or deleting data, damaging computer equipment, and causing data on someone else's computer to become corrupted. Computer sabotage is an action that is called as a ‘silent destruction’. It is because people cannot identify where the attack comes from and who are the one that is attacking the system. So this is the reason why every computer need anti-virus and spyware program so that computer is not easily being sabotage.


Below are the videos related to sabotaging activities.



Data Theft Sabotage

Data theft is an illegal access which are reading, editing, or coping of data without the data owner’s authorization. In other words, if a company’s server has been accessed by a hacker it is a case of data theft where they read the mails of our colleagues and steal company’s information for own purpose or destruction purpose. Commonly, this information is user’s information such as passwords, social security numbers, credit card information, and other personal information or other confidential corporate information. These kinds of information are significant and confidential to be obtained because the reason of putting security into page is to protect everything that is inside the page from other people. So when the individual who stole this information is apprehended, he or she will be prosecuted to the fullest extent of the law.


There are three types of data theft which are hacking, remote access and spyware. Hacking is the practice of modifying the features of a system in order to accomplish a goal outside of the creator's original purpose such as hackers gets into a system where he or she is not supposed to be and steals whatever data was aimed by the hackers. The person who is consistently engaging in hacking activities and has accepted hacking as a lifestyle and philosophy of their choice is called a hacker. One of the famous hacker is computer hackers that commonly do hacking activities. Other than that, the way hackers get into the system is by finding their ‘gate way’ through gaps in the security system and by hoodwinking gullible employees or surfers in order to gain access to a system. One of the other forms of hacking is phone hacking and brain hacking.


Other than hacking, remote access is also one of data theft which that has the ability of a person to gain access to a computer or a network from a remote distance. Remote access allows the thief to gain control of our machine from wherever he or she is and operate it such as stealing data and can even distribute virus from it. One of the example of remote access theft is when a person opens up the network to a connection from an external source, a person will face a risk that the connection can be used by a third party to access the network or that business information and can be intercepted from network that is distance by them. 


Moreover, Spyware is a form of malware or malicious software programs that can be installed on a personal computer without the consumer's awareness. It is picked up from websites, instant messages, email, and file-sharing connections. It is sometimes called as 'piggybacks' a piece of software and often advertised as security or acceleration software which is referred to as a 'Trojan horse'. Spyware always been brought in through adware. It may not sit in the system but the key strokes or mouse clicks would be spied by them, in other words we are revealing what we are doing and they are reading the data as we put it in. Most of spyware theft happen is when an ad pops out to our screen and when we click it we have opened the gateway for them to get into our system.



Below are the videos related to the data theft activities.





All in all, active threats has its own good and bad perspective. It is not encouraged to be used as self-interest but possibly encouraged to be used in the aid to the country or nation. It will then be at least something good and helpful. A good contribution can be made to your own generation.











Thursday 24 January 2013

BRIEFLY EXPLAIN TWO TYPES OF INTRUDERS CREATIVELY AND INNOVATIVELY


An intruder is anyone who accesses equipment, electronic data, or files without proper authorization. In other words, an intruder is the one that is not welcomed and having the intention to do criminal things to bring down someone for a miserable life which is also known as a trespasser. By the word intruder carries a lot of meaning. When someone says intruder, the first thing that will come in mind is that a person who broke in into a person's house which is said in other word as burglary.




However, intruder is also known as a person who is trying to steal information from another person by using the latest technology in our world which is the computer or laptop and the basic need for these activity is the internet.




Intruders is derived by the desire mostly to be a billionaire by stealing some very important information of an entity or valuable asset of an entity. They are also willing to do criminal things such as killing somebody or blackmailing somebody so that the intruder's secret is not exposed to the public as it is to be avoid to be acknowledge by the police and other authorities that might get involved in.



There are many types of intruders such as hackers, unnoticed intruders, wire tappers, piggy backers, impersonating intruders and eavesdroppers.

HACKERS



UNNOTICED INTRUDERS



WIRETAPPERS



PIGGY BACKERS



IMPERSONATING INTRUDERS



EAVESDROPPERS



Two of the most types of intruders that is increasing and is famous of its occurrence are wiretappers and piggy backers.
  • Wiretappers.
Wiretapping is the practice of connecting a listening device to a telephone line to secretly monitor a conversation. These kind of intruders is dangerous. It intrude in the sense of wiretapping someone's phone line in order to gain the confidential information that no one should know about. It is the easiest way to intrude someone's conversation without having to threaten somebody. However, wiretapping is not all the bad things. Sometimes it is used to spy on someone such as the police. Police have their own expert in wiretapping the criminal's conversation. It is to prevent from the bad things to happen and what the criminal planned will not be a success and so will add up to the peacefulness of a country or place. Check out the videos below on knowing what wiretapping may lead to and its other consequences.


OBAMA WANTS TO CONTINUE WIRETAPPING AMERICANS



WILLIAM KOSTRIC WIRETAPS MANCHESTER POLICE



Apart from that, a person can also detect and prevent on the wiretapping activities. It is shown in the videos below.

HOW TO TELL IF YOUR PHONE IS TAPPED



STOP CELL PHONE TRACKING, SPYING, STALKING, HACKING AND EAVESDROPPING WITH THE DETRACKTOR



  • Piggy backers.
Piggybacking is the practice of establishing a wireless internet connection by using another subscriber's internet access service without the subscriber's knowledge or consent. It is an  offence and may be convicted for crime under specific basis. These activity has been going on all over the world due to the urbanization and rapid technology development. The person who is able to do piggybacking might be someone who is expert in electronic stuffs and have wide knowledge about hacking field. It can also be learned in the internet. However, it is in the same shoe as wiretapping. Sometimes people could not afford for the internet so that is why they have to do such thing. In our sense as humans, it is not wrong and we sympathized that person. Nevertheless, it is still considered as a crime as internet access can be gain and get from the cyber cafes. Below are some videos that may relate to piggybacking.


CHEAP INTERNET ACCESS PROVIDER


.
LOOKING FOR THE CHEAPEST INTERNET SERVICE? MIGHT WANNA THINK TWICE



HOW TO GET FREE WIFI ACCESS ON YOUR MOBILE



Apart from that, a person can also detect  and prevent on the piggybacking activities. It is shown in the videos below.

HOW TO SEE WHO IS USING YOUR NETWORK, WIRELESS INTERNET



HOW TO TELL IF SOMEONE IS STEALING YOUR WIFI AND HOW TO GET THEM OFF





In a nutshell, intruders is made out of so many types in the world. There is advantages and disadvantages towards doing the intruding activities. So it is advisable for everyone to THINK TWICE before doing so.


LET'S TAKE A BREAK. :)




Monday 10 December 2012

NESTLE PRIMARY AND SUPPORTING BUSINESS PROCESSES

Nestle is one of the biggest food manufacturer in Malaysia. It is first found in the year of 1867. The founder of Nestle is Henri Nestle. He was a trained pharmacist who is trying to help the infant to gain nutrition other than breastfed. It has achieve tremendous results till today in providing various of healthy food to the world.

HENRI NESTLE

The basic business processes involved primary and supporting business processes.

1. Primary Business Process
  • Inbound Sales Logistics
  • Outbound Sales Logistics
  • Operations
  • Marketing
  • Service
2. Supporting Business Process
  • Procurement
  • Human Resources
  • Technology Department
  • Firm Infrastructure




For over the centuries, Nestle has expand their business rapidly all over the globe. It is very popular among the consumers as the products has been giving out positive feedback. We will explain regarding their business processes that have made them as one of the biggest and famous food manufacturer in Malaysia and also outside of Malaysia.


PRIMARY BUSINESS PROCESSES OF NESTLE (MALAYSIA)

1. Inbound Sales Logistics
  • Receiving, storing and distribution of materials at the warehouse.
  • Head Office (HO) is located in Mutiara Damansara.
  • Nestle receives some of the stocks which is not available for production in Malaysia at its respective factories for storage and later distribution.
  • Manufacturing facilities are available at Petaling Jaya, Shah Alam (Selangor), Chembong (Negeri Sembilan) and Kuching (Sarawak). These are the only available manufacturing ventre if Nestle in Malaysia.
  • National distribution centre is at Bukit Raja, Klang (Selangor).
  • Factories in Malaysia are available at PetalingJaya, Shah Alam Complex, Batu Tiga (Shah Alam), Chembong (Negeri Sembilan), Kuching (Sarawak), Perak and Klang (Selangor).
2. Outbound Sales Logistics


  • Distributing products and services to customers.
  • Nestle prefers distributing their products by servicing in land transportation rather than rail train or short sea shipping because the possibilities of their product to deliver in good shape is higher.
  • Use big lorries that can load more products to avoid empty runs.
  • Send the stock to each Nestle branch around Malaysia.
  • Distribution are made with many kind of grocery shops' such as Tesco and Giant.


3. Operations
  • Transforming inputs into products or services.
  • Nestle have a lot of types of food which includes junior foods, milk, breakfast cereals, hot cereals, creamer, beverages, coffee, culinary products, chilled dairy, ice cream, confectionery & chocolate and many more.
  • For each product that they have, it will have its own ingredients and raw materials that they need. For instance, manufacturing of chocolate.
  • The input are the raw materials needed such as cocoa, milk and many more.
  • The process which will be done by the machine such as whipping of the ingredients then froze the ready made chocolate in chiller.
  • Finally, the output are the chocolates that have been packaged in their own brand which is Nestle.


4. Marketing
  • Helping customers to buy the products or services of the firm.
  • The most important thing to do with food business in Malaysia is that the foods must be based with Halal materials and is approved by higher authorities that it is officially Halal where the Muslims can consume it peacefully.
  • All ingredients that contained in the product is all labelled accurately on the container of the food.
  • Running a food based business is not an easy task as many advertising need to be done.
  • However, Nestle is brilliant in attracting their potential customers and also existing customers.
  • Many types of advertisement that is made by Nestle such as through television commercials and flyers that is passed around at the shopping mall and many more.



5. Service
  • Post sale support provided to customers such as repairs and maintenance function.
  • Nestle provides its official website for the consumers to review its products.
  • It is very helpful as all functions and purposes of product is stated clearly and is a satisfactory.
  • The website has a very welcoming vision.
  • Make people that consume the product feels healthy, happier and prevent from getting diseases because if the good nutrition in their food and beverages products.
  • Sugar content in Nestle product have been reduced to 34% and salt level has been reduced to 75%.


SUPPORTING BUSINESS PROCESSES OF NESTLE (MALAYSIA)

1. Procurement


  • Buying the resources needed to carry out the entity is the primary activities.
  • Finding potential supplier.
  • Nestle have a lot of supplier around the world to keep them always available with raw materials needed to manufacture products.

2. Human Resources
  • Recruiting and hiring new employees.
  • Training, paying salary and employee benefits.
  • Nestle is not only good in producing nutritional products, they are good in attracting people to join their company.
  • Nestle have given many job opportunities to the public with many different positions.
  • Advertising of job in website and newspaper.
  • Nestle have also given useful information in the website for the one who is interested to work with them.
  • Nestle is also known as one of the companies that took care of their employees' rights and duties.

3. Technology Development
  • Activity to improve company's product or services.
  • Nestle have a department of 'Research and Development' to make sure that they are always up to requirements of the public.
  • It is a costly thing to do for company but it pays back the cost with double profit.
  • Having the department of 'Research and Development' helps Nestle a lot in healthy competition aspect.
  • Nestle also use solar panels in warehouse as energy consumption.
  • Nestle is a very economically friendly company.

4. Firm Infrastructure

Nestle has a very stable infrastructure. It is all planned properly by expertise and high education people who have a lot of experience in the nutrition field. It have its own accountant, lawyers, administrative and other officers to do their significant job that has been assigned. Below are the members in the board of director and is assigned to its own job.

  • Managing Director - Peter R. Vogt
  • Executive Director (Finance & Control) - Marc Seiler
  • NCE Market Champion, MYSG Region - Chew Soi Ping
  • Executive Director (Coffee & Beverages) - Donald Howat
  • Executive Director (Supply Chain) - Patrick Hartless
  • Executive Director (Technical & Production - Adnan Pawanteh
  • Executive Director (Sales) - Victor Seah
  • Executive Director (Human Resource & Group  Corporate Affairs) - Zainun Nur Abd. Rauf
  • Executive Director (Nestle Professional) - Yap Yin Kee
  • Executive Director (Milks) - Ho Hou Chieh

In conclusion, Nestle is a very systematic company that practice the primary and supporting business processes. :) 

Saturday 8 December 2012

UBS SKILLS THAT I HAVE LEARNED UNTIL TODAY (04.12.2012)

First of all, we have to install the Sage UBS system into our computer or laptop. It is a very simple installation system. Just follow the instructions given in the Sage UBS's work book according to the edition or version that you have bought.



Below are the steps and skills that we have learned so far. It is attached together with pictures of examples.

1. Once the installation is completed, enter the UBS system. The first thing that will appear on the screen is that the selection of company. We have to create new company or select your previous company date. It is better to make new company for beginners.
  • Click the 'Add' button and then enter the company's name including the directory.
  • After entering the company's name, click 'Save' and then 'Cancel'.
  • Your company's name will then be saved like the example below. Click on the company that you have create earlier and press 'Select'.

2. The log in to UBS accounting screen will appear as shown below.
  • Select the user as Admin and enter the password accordingly.
  • Do not forget to change the date of your business.
  • Once everything is filled in, press 'Sign In'. 


3. The main menu screen will appear once you have successfully logged in as shown below.


4. Update your company's profile by pressing on 'Housekeeping' then 'Setup' and finally 'General Setup' as shown below. Once everything is finalized, press 'Ok' as shown below.


5. Press on the 'General' which is numbered as '1' on the top screen to filled in the general ledger with its own number of account, account type and special account type.
  • Press 'Add' to create your chart of account. Fill in the details that is needed and finally save it like the example shown below.


6. After entering all chart of accounts, you will need to check the accounts that is entered earlier is correct or not by pressing on the 'General' which is numbered as '3'. A screen will appear as shown below.
  • If the chart is wrong, you can just double click on the one that is wrong to edit it and finally save it.

7. The next step is to create batches for the business which is to press on the 'Transactions' and select option number '2' which is 'Organise Batches'.
  • Press 'Add' and fill in your batches until it is complete as shown below.
  • Press 'Exit' once everything is done. It will be automatically saved and if you want to edit it, you will just go to the same option like the one in the first place in organizing batches.

8. The next skill is to back up the file that you have created. Press on 'File' on top of the screen and select 'Backup and Restore'. Choose 'Backup' only as you only want to back up the file.
  • Select on which disk drives which is C or D to save the file of your back up as shown below.

9. Close the UBS system and check on your 'My Computer' to see the back up files that is saved earlier.
  • Rename your file and save it again as shown below.

10. Enter the UBS system again and go to 'Housekeeping' to update the company's profile.
  • After that, stay on the 'Housekeeping' option and press 'Clear Files/Generate Sample Chart' to delete the previous information that is set earlier.
  • Select the option of clearing both chart of account and transactions as shown below.

11. Re-enter new chart of accounts like the one that is shown in step number 5. Below are the example of how to edit the chart of account.
  • Press 'Save' once everything is edited and confirm.

12. Re-enter new batches like the one that is instructed in step number 7. Below are the example.


13. Enter business transactions by pressing 'Transactions' and choose 'Transaction Files Maintenance'.
  • Add transactions for example Debit Bank and Credit Capital for RM 50,000 respectively. Below are the examples of transaction made.
  • Enter all necessary transactions and finally exit.


14. Repeat step number 8 to back up the file so the transactions are all saved.

All in all, these are the skills that we have learned so far (04.12.2012). :)

Wednesday 5 December 2012

My 1st Blog Post Regarding Accounting Information System (DAC0163) Mini Blogging Project



Our very first opinion regarding accounting information system is that it is another kind of account subjects where we have to do a lot of calculation and formulas that we have to memorize. However, as time past by, it is indeed a very interesting subject.




By definition itself, accounting information system is a collection of resources designed to transform data into information. An intersection of accounting and information system is also what accounting information system is referred to. There are three main things in accounting information system which are system, data and information.



  • System is a set of interrelated component that interact to achieve goal and encourages interaction.
  • Data is facts that are collected, recorded, stored and processed by information or system. It is not considered as an important material as it have no meanings to the system.
  • Information are data that have been organised and processed to provide meaning to a user. The better information gained, the better decision can be made.

Accounting information system have three main components which are inputs, processes and outputs.
  1. Inputs are the data or information from internal or external resources.
  2. Processes is when the information being sort, organised and calculated.
  3. Outputs are information for internal or external use for decision making.







The video above is the examples of system which includes the input, process and output. It is a very good examples and can be understand easily.


We learned a lot of new skills from the subject itself. What makes it interesting is that it involves practical studies where we have lab classes. It is not a class full of theory which tend to make students feels sleepy and does not pay attention to what the lecturers are teaching. It is a great exposure of learning the system which might be used in some accounting field business.