Top Retail Management Software


Top Retail Management Software

It is difficult to define the term “retail management software” due to the fact that the OS performs two unrelated functions: providing the user-programmer with an advanced machine and improving the efficiency of the computer by rational management of its resources. In most cases, it is understood as a set of programs, the functions of which are control over the use and allocation of resources of the computer system.

Functional Criteria of Retail Management Software

Functional criteria are divided into four groups, each of which describes the requirements for services that provide protection against threats of one of four main types:

  • Threats related to unauthorized access to information are threats to confidentiality, namely confidentiality, administrative confidentiality, reuse of objects, analysis of hidden channels, confidentiality in exchange (export/import).
  • Threats related to unauthorized modification of information are threats to integrity, namely trust integrity, administrative integrity, retail management software, rollback, and exchange integrity.
  • Threats related to the disruption of the ability to use computer systems or processed information are threats to accessibility. Availability includes the following services: resource utilization, fault tolerance, hot-swap, disaster recovery.
  • Identification and control of user actions, controllability of the computer system are the subject of surveillance and controllability services. The following services are included in the observation: registration, identification and authentication, reliable channel, division of responsibilities, the integrity of the complex of means of protection, self-testing, authentication during the exchange, sender authentication (non-renunciation), recipient authentication (non-renunciation).

In addition to the functional criteria for assessing the availability of security services in a computer system, this document contains criteria for safeguards to assess the correctness of the implementation of services. Guarantee criteria include requirements for the architecture of the complex of means of protection, development environment, sequence of development, testing of a complex of means of protection, the environment of functioning, and operational documentation.

These Criteria introduce seven levels of safeguards that are hierarchical. The hierarchy of levels of guarantees reflects the gradually increasing degree of certainty that the services implemented in the computer system can withstand certain threats, that the mechanisms that implement them, in turn, are correctly implemented and can provide the expected level of information security during computer operation. systems.

Management Software of Top Retail

The first generation computers (on electronic lamps) did not have any software, all programming was at the user level, i.e. the computer was perceived literally as a software-controlled computer. With the second generation of computers (on discrete semiconductor devices) was born and system programming, i.e. the creation of libraries of programs, translators from different programming languages, and, finally, the creation of monitoring systems that control the process of passing tasks through computers and provide a level of automation. which on the computer of the first generation was carried out by the person-operator. These monitor systems have become the forerunners of the OS for third-generation computers (integrated semiconductor devices).

The main functions of the retail management software include:

  • initiation and completion of user tasks;
  • managing the progress of their implementation;
  • processing of various exceptional situations that arise in the process of work (for example, error handling in a program or hardware);
  • distribution of computer resources between tasks;
  • ensuring the possibility of using existing software public use (files, archives, translators, etc.);
  • mutual protection of programs and information belonging to different users;
  • optimization of parallel operation of computer devices in order to achieve the highest productivity;
  • registration and accounting of all work performed, which allows, in particular, to perform financial calculations from cor.

About the author

admin administrator