Professional Documents
Culture Documents
main tasks
risk of theft
risk of viruses
verify that control are in place to
protecteverything
OS Objectives
objectives
audit objectives
log on procedure
access token
EDI standard
reduces the need for data entry
OS Security
data keying
error reduction
paperless
postage
benefits of EDI
automatic
inventory reduction
financial EDI
EDI controls
threats to OS integrity
access control
all EDI transactions are authorized,
validated, in compliance with trading
partner agreement
audit objectives
audit procedures
audit procedures
reusable password
intranet risk
examples
IP Spoofing
audit objectives
internet risk
network-level firewall
application-level firewall
software
screening router
comm lines
hardware
firewall
audit objectives
encryption
digital certificate
audit procedures
event-oriented logs
flexibility
filtering
auditing network
controlling network
proxy service
segregation of systems
audit tools
probe for weakness
verify IPS with DPI is in place
audit objectives
audit procedures
audit objectives
line errors
request-response technique
through interviews
digital signature
victim
intermediary
zombie / bot
audit procedures