Spelling suggestions: "subject:"auditing - access control"" "subject:"auditing - cccess control""
1 |
An evaluation of integrity control facilities in an AS/400 environmentBosman, Michael Louis 23 September 2014 (has links)
M.Com. (Computer Auditing) / Both the auditor, faced with the task of determining an effective and efficient audit approach, as well as management, charged with implementing and monitoring need purer security, need to evaluate integrity controls. This need to evaluate integrity controls is increasing, due to the growing complexity of computer environments, the breakdown of the paper audit trail, and the replacement of application controls by integrity controls. By applying the Access Path and Path Context Models, an evaluation was performed of integrity controls and risks in an AS/400 environment. The operating system (08/400) was delineated into functional categories to assist in the evaluation, in a manner consistent with that outlined in the Access Path Model. It was found that sufficient integrity control facilities exist in an AS/400 environment to meet the control objectives, although several risks were identified which could only be addressed by application controls.
|
2 |
Authorisation as audit risk in an information technology environmentKruger, Willem Jacobus 05 February 2014 (has links)
M.Comm. / Please refer to full text to view abstract
|
3 |
Evaluation of access control within the Millennium software packageVan Rooyen, J. 23 September 2014 (has links)
M.Com. (Accounting) / Please refer to full text to view abstract
|
4 |
A model for the evaluation of control with reference to a simple path context model in a UNIX environment08 September 2015 (has links)
M.Com. / Information and the IT systems that support it are important business assets. Their availability, integrity and confidentiality are essential to maintain an organisations competitive edge, cash flow, profitability, company image and compliance with legal requirements. Organisations world-wide are now facing increased security threats from a wide range of sources. Information systems may be the target of a range of serious threats including computer-based fraud, espionage, sabotage, vandalism and other sources of failure or disaster ...
|
Page generated in 0.105 seconds