Page 6 - PowerPoint Presentation
P. 6
COMPUTER AUDIT – NETWROKS AND RELATED CONCEPTS
ACCESS CONTROL (VALIDIDTY)
• Invalid access could result in;
• Obtaining confidential information
• Interception of data during transmission
• Alteration or modification of programs or data
• Blocking the flow of data.
• Unauthorised access can be obtained by;
• Via a network PC, or
• Via connecting an unauthorised PC to the network
• Logical access controls are critical to mitigate the
risk.
6