Page 7 - PowerPoint Presentation
P. 7

COMPUTER AUDIT – NETWROKS AND RELATED CONCEPTS





            ACCESS CONTROL (VALIDIDTY) (Continued…)



            • Implement controls at both system and


                application levels based on;



                    • Identification of users



                    • Authentication of users and computer resources


                    • Authorisation by defining levels of access to be

                       grated to users and computer resources.



                    • Encryption, scrambling or encoding data to make it

                       unintelligible to unauthorised users.


                    • Logging (recording of time and details of access and


                       access violations, and later investigation)






                                                                                                                                       7
   2   3   4   5   6   7   8   9   10   11   12