CH 8 - Information System Controls
CH 8 - Information System Controls
CH 8 - Information System Controls
CONTROLS
Chapter 8
INFORMATION TECHNOLOGY (IT)
CONTROLS AND THE BUSINESS
• Examples: data matching, file labels, batch totals, cross-footing and zero-balance tests,
write protection mechanisms, database processing integrity controls
• 3. Output controls ensure the output’s validity, accuracy and completeness
• Examples: reviews and reconciliations, encryption and access controls, parity checks,
message acknowledgement techniques
USER ACCESS CONTROLS
• 1. Authentication controls
a. Passwords – the most commonly used authentication method which could
be a series of letters, numbers or both that must be entered to access
and use system resources
b. Biometric identification – uses distinctive user physical characteristics such
as voice patterns, fingerprints, facial patterns and features, retina prints
and signature dynamics to identify people.
• 2. Authorization controls
Access control matrix – an internally maintained table indicating what
actions users can execute in the system and which portion of it they are
authorized to access
NETWORK ACCESS CONTROLS