Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
31 views1 page

CIS Chapter 3

Access controls like access rights, strong passwords, virus protection, and audit trails are important for security and privacy. Privileges should be properly managed and inspected regularly. Organizations should also use long, complex passwords to prevent risks and strengthen security systems against unauthorized access and fraud. The document proposes implementing a hidden monitoring and access control system that only management can view, to detect any internal fraud schemes and tighten security and passwords to prevent deception.

Uploaded by

Daniela Ordonez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views1 page

CIS Chapter 3

Access controls like access rights, strong passwords, virus protection, and audit trails are important for security and privacy. Privileges should be properly managed and inspected regularly. Organizations should also use long, complex passwords to prevent risks and strengthen security systems against unauthorized access and fraud. The document proposes implementing a hidden monitoring and access control system that only management can view, to detect any internal fraud schemes and tighten security and passwords to prevent deception.

Uploaded by

Daniela Ordonez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

ORDOÑEZ, PRECIOUS DANIELA ELLAINE R.

BSA 4A

1. Access rights, password security, virus protection, and audit trail security are all suitable access
controls for the current circumstance. First and foremost, access privilege is crucial since it
dictates who can only access the data. Additionally, so that they may assess whether their staff
members adhere to and formally admitting their obligations to preserve the strict confidentiality
of the information they hold. As a result, privileges should be properly managed and closely
inspected to ensure that they adhere to organizational policy and internal control principles.
Control by password is the second. Additionally, it is crucial for the sake of protecting the data of
the business. By adding passwords into their systems, businesses can improve their level of
security, lower their danger of data loss, and stay clear of damaging infections (virus control).
Finally, the auditing process control is crucial because it enables the company to effortlessly
track and identify the files in which they store a variety of significant data, including sales,
inventory, and cash receipts, which are all recorded by the business.

2. An organization ought to deliver stronger passwords to prevent damaging risks and reinforce
their security systems to limit the possibility of fraud and unauthorized entry from online
fraudsters as part of the safety measures and guidelines that may mitigate these risks.

3. That I will set up a monitoring and accessibility control system in our firm's systems that can be
concealed from my employees and can only be observed by me as their superior in order to
discover a fraud scheme that is taking place inside my company. And in order to stop this kind of
deception from happening, I'll keep keeping an eye on our systems and tighten their security and
passwords.

You might also like