What people are saying - Write a review
We haven't found any reviews in the usual places.
PREVENTION DETECTION AND DETERRENTS
4 Personnel Practices and Procedures
16 other sections not shown
Access control lists access controls action administrative amount application approved areas audit software audit trail bank Base Systems Safeguards batch control catalog Ch.7 Communications checks ciphertext Communications and Data company's computer fraud computer system control totals copy countermeasures cryptanalyst Data Base Systems Data Encryption Standard data files data processing department detected discrepancies discussed EDP auditing EDP auditor EDP Internal Audit employees encryption system ensure entry evaluate Fidelity Bonding Figure fraudulent identify individual input transactions Internal Controls inventory investigation involved job rotation loss maintained manipulation ment modified on-line operating system output password performed perpetrator person personnel plaintext Polyalphabetic substitutions polygraph possible preprinted prevent problem procedures production libraries production programs program/system protected puter RACF records reports request responsible risk sensitive source documents specific standards supervisor system software terminal tion types unauthorized user department user identification verify