Page 59 - Auditinf Electronic System
P. 59
▪ activity by user, workgroups, or departments
▪ Access to specific files or applications
▪ Failed log on attempts
3. Disposition of security violation to assess the effectiveness of security
group.
❑ Verify Data base management controls (Access controls - backup Controls)
60
59
جميع الحقوق محفوظة ـ الإعتداء على حق المؤلف بالنسخ أو الطباعة يعرض فاعله للمسائلة القانونية