Question: A comprehensive program for controlling access to the computer equipment, computer programs, and data is an important control. In evaluating the comprehensiveness of an access

A comprehensive program for controlling access to the computer equipment, computer programs, and data is an important control. In evaluating the comprehensiveness of an access policy, the auditor considers both physical and data access (that is, access to data by gaining access to computer files through the computer).

Required
a. Identify questions the auditor might ask regarding the physical controls over access to the equipment and computer documentation.
b. Identify the three main ways an access control program can authenticate a user. What are the advantages and disadvantages of each approach?
c. What are the risks in using a physical identifier such as a retinal scan or a fingerprint as the major approach to authenticating users? What are the implications to the user if the authentication is compromised?
d. Assume that a client has software that does a good job in authenticating users. Explain how an access matrix works and the importance of developing an access matrix for security. Explain how users and access should be matched on a matrix.

Step by Step Solution

3.38 Rating (164 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a Are there cameras to monitor the actions of employees Are there locks on doors where appropriate to keep unauthorized users from where they are not ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

222-B-A-A-B-R (357).docx

120 KBs Word File

Students Have Also Explored These Related Auditing Questions!