Page 6 - PowerPoint Presentation
P. 6

COMPUTER AUDIT – NETWROKS AND RELATED CONCEPTS




            ACCESS CONTROL (VALIDIDTY)





            • Invalid access could result in;


                    • Obtaining confidential information


                    • Interception of data during transmission


                    • Alteration or modification of programs or data


                    • Blocking the flow of data.


            • Unauthorised access can be obtained;



                    • Via a network, PC, or

                    • Via connecting an unauthorised PC to the network



            • Logical access controls are critical to mitigate the


                risk.






                                                                                                                                       6
   1   2   3   4   5   6   7   8   9   10   11