ais ch #16 - Alec Kraft Accounting Information Systems...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Alec Kraft Accounting Information Systems Ch.16 DQ: 4. The access token and access control list are used to approve or deny access by having a user log-on to the operating system which creates an access token with all the user’s information and privileges on it. When the user tries to access a resource, the access token compares with the resources access control list that has the access privileges for all valid users of the resource. If there is a match in privileges between the access token and access control list then the user is granted access. 6. Threats by destructive programs can be reduced many ways through technology controls and administrative procedures. The administrators can purchase software only for reputable vendors that have original, factory-sealed packages, issue an entity-wide policy pertaining to the use of illegal copies of copyrighted software, and establish an education program to raise user awareness regarding threats from viruses and malicious programs. Other ways to reduce the risk would be to use antiviral software to examine
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/10/2011 for the course BUS 301 taught by Professor O'byrne during the Spring '11 term at San Diego State.

Page1 / 2

ais ch #16 - Alec Kraft Accounting Information Systems...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online