Alec Kraft
Accounting Information Systems
Ch.16
DQ:
4. The access token and access control list are used to approve or deny access by having a
user log-on to the operating system which creates an access token with all the user’s
information and privileges on it. When the user tries to access a resource, the access
token compares with the resources access control list that has the access privileges for all
valid users of the resource. If there is a match in privileges between the access token and
access control list then the user is granted access.
6. Threats by destructive programs can be reduced many ways through technology
controls and administrative procedures. The administrators can purchase software only
for reputable vendors that have original, factory-sealed packages, issue an entity-wide
policy pertaining to the use of illegal copies of copyrighted software, and establish an
education program to raise user awareness regarding threats from viruses and malicious
programs. Other ways to reduce the risk would be to use antiviral software to examine
This
preview
has intentionally blurred sections.
Sign up to view the full version.

This is the end of the preview.
Sign up
to
access the rest of the document.
- Spring '11
- O'Byrne
- Accounting, Business, Authorization, Access control list
-
Click to edit the document details