Page 6 - PowerPoint Presentation
P. 6

COMPUTER AUDIT – NETWROKS AND RELATED CONCEPTS




            ACCESS CONTROL (VALIDIDTY)




            • Invalid access could result in;



                    • Obtaining confidential information

                    • Interception of data during transmission


                    • Alteration or modification of programs or data


                    • Blocking the flow of data.



            • Unauthorised access can be obtained by;


                    • Via a network PC, or


                    • Via connecting an unauthorised PC to the network


            • Logical access controls are critical to mitigate the


                risk.






                                                                                                                                       6
   1   2   3   4   5   6   7   8   9   10   11