15_AIS_Controls_Part_2

15_AIS_Controls_Part_2 - Overview General controls for AIS...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
1 AIS Controls 2 Lect 15 ` General controls for AIS ` Application controls for AIS Overview ` Main objectives ` Security for wireless network systems ` Security for wired network systems ` Microcomputer security Level 2 IT General Controls ` Development and changes to computer programs are ` Authorized ` Te s t e d ` Approved ` Access to data files Main Objectives ` Restricted to users ` Restricted to programs ` Risk ` Control procedures or mitigation Wireless Security ` Risk ` Control procedures or mitigation Wired Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 ` Risk ` Control procedures or mitigation Microcomputer Security ` Input controls ` Accuracy ` Validity ` Completeness ` Processing controls Level 3 Application Controls ` Data access ` Data manipulation ` Output controls ` Validating results ` Regulate distribution Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 3

15_AIS_Controls_Part_2 - Overview General controls for AIS...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online