Communiquez avec les autres et partagez vos connaissances professionnelles

Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.

Suivre

Programme controls entail: a. Manual logs; training of staff; b. firewall; insurance, maintenance; c. User authorisation; data encryption

user-image
Question ajoutée par Utilisateur supprimé
Date de publication: 2015/01/20
imran Noor -
par imran Noor - , Audit Officer , Auditor General of Pakistan

The correct option is (C)

Waqayan Al Waqayan
par Waqayan Al Waqayan , Secretary of Sharia Supervisory Board (SSB) , Ahli United Bank (AUB)

all of them are good controls. however c. is the most relevant and important application control.

Waqas Raza Khan
par Waqas Raza Khan , Accountant , Cold Store Group of Saudi Arabia

Option C

احمد صبحي احمد الصباغ الصباغ
par احمد صبحي احمد الصباغ الصباغ , محاسب عام في قسم الميزانية , شركة الجبر لتجارة السيارات -كيا موتورز

Because data encryption Si easily breached if the encryption software of the type complex either protection system through the entry permit is useful somewhat, but a breakthrough is faster than the encryption system by special methods used by the hacker easy access easily to the site without passing the permit system them to enter or not remains regularity best for the safety and privacy of encryption programs

Khurram Shaukat Memon
par Khurram Shaukat Memon , Academic Research Writer , Freelance Academic Research Writer

I think option (c) is correct answer.

Mir Mujtaba Ali
par Mir Mujtaba Ali , Internal Audit Manager , Confidential

Option C could be the answer - I guess

?

More Questions Like This