-
Wenlin Zhou posted a new activity comment 8 years ago
Great, I agree with you. Correct and reliable master data constitute the basis for all business processes. Discrepancies in payment terms, customer addresses or dangerous goods information can lead to significant delays in business processes (e.g. settlement of invoices, incorrect deliveries, etc.), or even lead to entire consignments of goods…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
I agree with you. Finance architecture is often complex due to multiple systems. Each system has got a dedicated repository. Therefore, it’s difficult to share data across a wide range of financial applications. Financial master data needs to be quickly and easily adapted to business changes at the fast pace of business. Financial MDM is e…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
I agree with you. The master data bring a lot of benefits. For example, Controlled collection and execution of all master data requests throughout the organization. Simple-to-use web application as entry point for any master data request. Integrated approval routines align with established business processes. Improved visibility with single point…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
I agree with you. Master data management is key to regulatory compliance. Keeping master data up-to-date is usually a request-driven process that involves multiple people and many steps, often with less-than-ideal results. Poor master data quality and duplicate master records are common issues, leading to problems and high costs in other…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
Which transaction do you believe is the most ‘Sensitive’ and therefore should have extra focus in an SAT (Sensitive Access to Transaction) audit? Explain
Defining high-risk (sensitive) activities and specific transactions that are deemed “sensitive” is an essential part of every auditor’s role and every authorization-related project, because t…[Read more] -
Wenlin Zhou posted a new activity comment 8 years ago
Master data in an ERP system is highly integrated with various processes and effects many parts of the organization. How does an organization assure this integration works well for all?
Definition of Master Data Management is “a set of disciplines and processes for ensuring the accuracy, completeness, timeliness and consistency of the most i…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
I agree with you. The data analytic is a useful way to protect company security. Big data analytics tools have the ability to accurately discover devices on a network. In some cases, a configuration management database can supplement and improve the quality of automatically collected data. Integration with third-party security tools as well as…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
I agree with you. The Authorization in SAP is the difficult part. Roles and Authorizations allow the users to access SAP Standard as well as custom Transactions in a secure way. SAP provides certain set of generic Standard roles for different modules and different scenarios. We can also define user defined roles:
Master Roles – With T…[Read more] -
Wenlin Zhou posted a new activity comment 8 years ago
I agree with you. Even if you are a small business, we can help you protect your business with effective segregation of duties. To help ensure segregation of duties, we will thoroughly document your business process, match the process with the job description and ensure that software settings only allow employees to complete the tasks necessary to…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
I agree with you. To reduce the risk of deleterious access to valuable assets such as equipment, money, data and intellectual property. There is no reason for a person not employed by, contracted with, patronizing, or otherwise not desiring a conducive relationship with a business location to be able to gain access to it. Nothing should be lost by…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
75 Percent of Organizations Lack Skilled Cybersecurity Experts
Only 25 percent of Tripwire survey respondents were confident their organizations have the number of skilled cybersecurity experts needed to effectively detect and respond to a serious cybersecurity breach. In addition, 66 percent of the respondents said their organization faced…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
I agree with you. On the other hand, Access controls help us restrict whom and what accesses our information resources, and they possess four general functions: identity verification, authentication, authorization, and accountability. These functions work together to grant access to resources and constrain what a subject can do with them.
-
Wenlin Zhou posted a new activity comment 8 years ago
I agree with you. Software developers should never have access to production systems. Production systems should not have compilers installed. A configuration management board or equivalent should be involved in the decision to place code that has been developed into a production environment. No code should ever be installed in a production…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
What is segregation of duties and why is it a commonly used control? Give an example of two (e.g. IT) roles that should be segregated?
Separation of duties is a classic security method to manage conflict of interest, the appearance of conflict of interest, and fraud. It restricts the amount of power held by any one individual. It puts a…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
Security in an ERP system (e.g. SAP) is complex. What is the most fuzzy, difficult to understand component? Explain
Outdated, unsupported software can lead to crashes and integration issues. The risk is that companies often seem to be ignored is the risk of running outdated, unsupported software systems. Why does this matter? Because older…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
I got an error, ” could not connect. server may not be running, and cannot to MySQL server on 127.0.0.1.
I just copy the file from C: to M:
and I changed the datadir=M:MySQLMySQL Server 5.7Data or datadir=M:MySQLMySQL Server 5.7Datamy.ini
Both of them did not works. -
Wenlin Zhou commented on the post, Database Development – MySQL Setup, on the site 8 years ago
Thank Paul, I solve this issue.
-
Wenlin Zhou posted a new activity comment 8 years ago
Large DDoS attacks cause outages at Twitter, Spotify, and other sites
Several waves of major cyberattacks against an internet directory service knocked dozens of popular websites offline today, with outages continuing into the afternoon.
Twitter, SoundCloud, Spotify, Shopify, and other websites have been inaccessible to many users throughout…[Read more]
-
Wenlin Zhou posted a new activity comment 8 years ago
How would you determine if an organization’s network capacity is adequate or inadequate? What impacts could be expected if a portion of an organization’s network capacity is inadequate?
Network capacity planning is an effective way to determine the organization’s network capacity adequate or not. A key feature of network planning is det…[Read more]
-
Wenlin Zhou commented on the post, Week 8: Questions, on the site 8 years ago
I agree with you. The network security is more important. By increasing network security, you decrease the chance of privacy spoofing, identity or information theft and so on. Piracy is a big concern to enterprises that are victims of its effects. Anything from software, music and movies to books, games, etc. are stolen and copied because security…[Read more]
- Load More