Page 7 - PowerPoint Presentation
P. 7

COMPUTER AUDIT – NETWROKS AND RELATED CONCEPTS





            ACCESS CONTROL (VALIDIDTY) (Continued…)




            • Implement controls at both system and


                application levels based on;



                    • Identification of users


                    • Authentication of users and computer resources


                    • Authorisation by defining levels of access to be


                       granted to users and computer resources.


                    • Encryption, scrambling or encoding data to make it


                       unintelligible to unauthorised users.


                    • Logging (recording of time and details of access and

                       access violations, and later investigation)







                                                                                                                                       7
   2   3   4   5   6   7   8   9   10   11   12