Necessary precautions have to be made to ensure that terminals in a computer information system are used in a controlled way by authorized personnel only....

      

Necessary precautions have to be made to ensure that terminals in a computer information system are used in a controlled way by authorized personnel only. Which are the security techniques used?

  

Answers


Wilfred
•• Hardware constraints e.g. necessitating the use of a key of magnetic strip badge or card to engage a terminal or placing the terminal in allocation to which access is carefully restricted and which is constantly monitored by closed circuit television surveillance systems.
•• The allocation of identification numbers to authorized terminal operators. With or without the use of passwords, these are checked by the main frame computer against stored records of authorized numbers or passwords.
•• Using operator characteristics such as voice, fingerprints and hand geometry (finger length ratios) as a means of identification by the mainframe computer.
•• Restricting the access to particular programs or master files in the mainframe computer to designated terminals.
•• In top security systems, the authority to allocate authorities such as determination of passwords and nominating selected terminals should be restricted to senior personnel other than intended users.
•• A special file maybe maintained in the central processor which records every occasion on which access is made by particular terminals and operators to the central programs and files. This log will be printed out on regular basis or on request by personnel with appropriate authority.
Wilfykil answered the question on April 12, 2019 at 07:04


Next: Describe how you can determine the density of a liquid.
Previous: Describe distillation as a method of seperation of mixtures.

View More CPA Auditing and Assurance Questions and Answers | Return to Questions Index


Exams With Marking Schemes

Related Questions