Page 15 - PowerPoint Presentation
P. 15

COMPUTER AUDIT – THE BASICS




            ACCESS CONTROLS


            • Access to info which may lead to;



                    • Destruction od date

                    • Theft of data


                    • Improper changes  to data

                    • Recording unauthorised or non-existent transactions


            • Access to particular functions can be restricted to

                certain terminals (e.g. EFT only FM’s computer can


                process).


            • Access tables/ profiles



            • PC timeout facilities and automatic shutdown



            • Least privilege principle must be implemented





                                                                                                                                   15


                                                                  CharterQuest
   10   11   12   13   14   15   16   17   18   19   20