logo

Information System Control and Auditing | Policies

   

Added on  2022-09-12

4 Pages557 Words15 Views
Running head: INFORMATION SYSTEM CONTROL AND AUDITING
INFORMATION SYSTEM CONTROL AND AUDITING
Name of the Student
Name of the University
Author Note

1 INFORMATION SYSTEM CONTROL AND AUDITING
Introduction
The organizations should maintain some policies regarding the control and auditing
management. The policies should be creted by the network manager, who will address the
situation appropriately. The policies should maintain the one access control, one user account
control and one database access control. Those policies are:
The policies regarding the one access control should be maintained to prevent the
unauthorised access for protecting the sensitive data appropriately. It can be stated
that if the technology and the data should be applied properly to protect the data with
the task completion for using the different task completion. One user access control
should be used to protect the data properly with preventing the unauthorised entrance.
So only one user for a specific purpose should be allowed to make the task finished
properly (Park, 2017).
The one access database control will help process the accessibility to those people
who are actually allowed to access the data properly. Both the authentication and
authorization will be done through the procedure of data security. This policy will
help to provide the dictionary access control, mandatory access control, role-based
access control and the attribute-based access control which will provide a systematic
way to prevent the unauthorised access. That is how it can be stated that data lost
chance will decrease in the organization (Bush, Case and Jasper,2018).
One access control can be specified with the role-based control system. The system
should be restricted to for only the specific amount of user to complete the process of
the work. In the other hand, the mandatory access control should be applied for
performing the target amount of thread completion. Both of the policies should be
applied to prevent malicious attacks with discretionary access control attacks. MAC

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology Infrastructure and Security
|13
|591
|20

Data System Requirements for ABC Clothing Company
|4
|540
|350

Cybersecurity | Information System Control and Auditing
|7
|1217
|15

Information System Control and Auditing | Report
|5
|712
|21

Introduction to Information Assurance and Information Security Assignment 2022
|4
|529
|16

Cloud Computing: A Comprehensive Analysis
|12
|509
|94