Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

AC and MC Charts

Download as pdf
Download as pdf
You are on page 1of 2
{prem Donlomnent Me eg eae eeeeeee ee eee inventing eating ean Achennn iam epesionia Reenieerateeest fer eno ectan ane ‘ter secietee Acne theme ded wen ecioion of ges oe trae stb tens “Tech Den Aes Re tortoise tebe pe ete gee Stent avers || eter Participation Trroughout ail |} 28°04 Pret” dvopmar || Ttcodd be otnanee eae eiie Program Testing: All modules |} WOP Testing. aastno mien peels ene treet nl noes Ree taree sel Coote npn Fig. 3.42: Categories of Managerial Controls feoundary Controls steps > mechanism = Identiti, Authentication & kuthoaation “Crypcpaphy: Transform data Into codes that oe meaningless fora non-authenticated person “Paaswords: User entiation by. authentication mechanism with choraterisis Ike Do8 ae “Pik: Random 99, algned to werbased on User characteris. ‘Adentifetion Cards: Used to Store infomation required. in authentication. “Blometic Devi Identeation rough “input Controls: Ensue accurcycompeteness of ata to be inputted ito pplication system. ‘Soutee Document contro To implement contol procedues over source ociments to acount for ‘exch document. “Data Coding onto: To reduce user error euting dat feeding “Batch Canto To reventfetect errs in sical bath LNaldtan Contra Detect ferors in transaction ata before data ae processed. Communication Controls: Discus exposures in the communication subsystem, controls over physical components, communication line ro flows8 inks, toplogial and channel access contol “Physical Component contrat: To tigate eet of exposures “Aine Err Canto Detect/eoeect ror of attenuation or sstortion “Flow Control: To contol rte at which data lows between sender anduecener. ‘AnkConrls: To manage the ink between two nodes in network ‘hanna Acces Controls Handle uation of cntention in chan irepaties ascodated with Cental processors eat Memory Conroe 70 detecveorect errors (hat occur in memory cal, to protect areas fof memory asiged to program trom egal acess Memory aps ial memory adersses Into real memory valdation checks to entity erors during processing of data output. Controls: Ensure tha) data daered to users it ‘eesente, formatted, deiveres consistent “storage and toggng of Sensitive and ral Form: Aces of pre rinted stationery to only authorized person. “Topping & monitoring of eutpt rogram excitons Spooting/Queving: To. ensure work contes while preting one “Controls over Printing: Unauthorized dlscosure of ‘nlormation nt pated “Report lstibaton and Ccolectin Controls: Secure ways to avoid unauthored dclosre

You might also like