{prem Donlomnent Me
eg eae
eeeeeee
ee eee
inventing eating
ean Achennn
iam epesionia
Reenieerateeest
fer eno ectan
ane
‘ter secietee Acne
theme ded wen
ecioion of ges oe
trae stb tens
“Tech Den Aes
Re
tortoise tebe
pe ete gee
Stent avers || eter
Participation Trroughout ail |} 28°04
Pret” dvopmar || Ttcodd be
otnanee eae eiie
Program Testing: All modules |} WOP Testing.
aastno mien
peels ene
treet nl noes
Ree taree sel
Coote npn
Fig. 3.42: Categories of Managerial Controlsfeoundary Controls steps >
mechanism = Identiti,
Authentication & kuthoaation
“Crypcpaphy: Transform data
Into codes that oe meaningless
fora non-authenticated person
“Paaswords: User entiation
by. authentication mechanism
with choraterisis Ike Do8
ae
“Pik: Random 99, algned to
werbased on User
characteris.
‘Adentifetion Cards: Used to
Store infomation required. in
authentication.
“Blometic Devi
Identeation rough
“input Controls: Ensue
accurcycompeteness of
ata to be inputted ito
pplication system.
‘Soutee Document contro
To implement contol
procedues over source
ociments to acount for
‘exch document.
“Data Coding onto: To
reduce user error euting
dat feeding
“Batch Canto To
reventfetect errs in
sical bath
LNaldtan Contra Detect
ferors in transaction ata
before data ae processed.
Communication Controls: Discus exposures in the communication
subsystem, controls over physical components, communication line
ro flows8 inks, toplogial and channel access contol
“Physical Component contrat: To tigate eet of exposures
“Aine Err Canto Detect/eoeect ror of attenuation or sstortion
“Flow Control: To contol rte at which data lows between sender
anduecener.
‘AnkConrls: To manage the ink between two nodes in network
‘hanna Acces Controls Handle uation of cntention in chan
irepaties
ascodated with
Cental processors
eat Memory
Conroe 70
detecveorect errors
(hat occur in memory
cal, to protect areas
fof memory asiged
to program trom
egal acess
Memory
aps ial
memory adersses
Into real memory
valdation checks to
entity erors during
processing of data
output. Controls: Ensure tha)
data daered to users it
‘eesente, formatted, deiveres
consistent
“storage and toggng of Sensitive
and ral Form: Aces of pre
rinted stationery to only
authorized person.
“Topping & monitoring of eutpt
rogram excitons
Spooting/Queving: To. ensure
work contes while preting
one
“Controls over Printing:
Unauthorized dlscosure of
‘nlormation nt pated
“Report lstibaton and
Ccolectin Controls: Secure ways
to avoid unauthored dclosre