Question: A comprehensive program for controlling access to the computer equipment, computer programs, and data is an important control. In evaluating the comprehensiveness of an access
Required
a. Identify questions the auditor might ask regarding the physical controls over access to the equipment and computer documentation.
b. Identify the three main ways an access control program can authenticate a user. What are the advantages and disadvantages of each approach?
c. What are the risks in using a physical identifier such as a retinal scan or a fingerprint as the major approach to authenticating users? What are the implications to the user if the authentication is compromised?
d. Assume that a client has software that does a good job in authenticating users. Explain how an access matrix works and the importance of developing an access matrix for security. Explain how users and access should be matched on a matrix.
Step by Step Solution
3.38 Rating (164 Votes )
There are 3 Steps involved in it
a Are there cameras to monitor the actions of employees Are there locks on doors where appropriate to keep unauthorized users from where they are not ... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
222-B-A-A-B-R (357).docx
120 KBs Word File
