Page 7 - PowerPoint Presentation
P. 7
COMPUTER AUDIT – NETWROKS AND RELATED CONCEPTS
ACCESS CONTROL (VALIDIDTY) (Continued…)
• Implement controls at both system and
application levels based on;
• Identification of users
• Authentication of users and computer resources
• Authorisation by defining levels of access to be
grated to users and computer resources.
• Encryption, scrambling or encoding data to make it
unintelligible to unauthorised users.
• Logging (recording of time and details of access and
access violations, and later investigation)
7