Page 15 - PowerPoint Presentation
P. 15

COMPUTER AUDIT – THE BASICS




            ACCESS CONTROLS




            • Access to info which may lead to;


                    • Destruction of data

                    • Theft of data

                    • Improper changes  to data


                    • Recording unauthorised or non-existent transactions


            • Access to particular functions can be restricted to


                certain terminals (e.g. EFT only FM’s computer can

                process).


            • Access tables/ profiles



            • PC timeout facilities and automatic shutdown



            • Least privilege principle must be implemented






                                                                                                                                   15

                                                                  CharterQuest
   10   11   12   13   14   15   16   17   18   19   20