Professional Documents
Culture Documents
Red and Black Gradient Esport Game Presentation
Red and Black Gradient Esport Game Presentation
APPLIC AT ION
CONT RO LS
APPLICATION
CONTROLS
Application controls are the steps
organizations can implement within
their applications to keep them private
and secure. Though applications are an
inevitable and vital part of the daily
operations of modern organizations,
they also put organizations at an
unprecedented risk of breach.
APPLICATION
CONTROLS
These are concerned with the accuracy,
completeness, validity, and authorization
of the data captured, entered, processed,
stored, transmitted, and reported.
PROCESSING
CONTROLS
OUTPUT
CONTROLS
This application control
governs the data inputs in an
INPUT
application. Input controls
prevent users from entering
CONTROLS
unvalidated information into
the system. These controls
might require data to be
entered in a given format or
authorization on all inputs
before adding them to the
information system.
4 TYPES OF INPUT CONTROLS
STANDARD
SOURCE PROCEDURES FOR
DOCUMENTS DATA PREPARATION
CONTROLS AND ERROR
HANDLING
CONTROL TOTALS
PROGRAMMED
AND
EDIT CHECKS
RECONCILIATIONS
SOURCE is the paper form used to
CONTROLS transaction
3 SOURCE DOCUMENTS CONTROLS
FORM DESIGN
PREPARATION
a. which form to use
b. how to complete form
c. which department to send the
HANDLING
STANDARD Error handling - The source
PROCEDURES
document should contain an
area for authorization by the
appropriate manager.
AND ERROR
basis. Corrective action might
require more training for
employees, better form design
HANDLING or better
procedures.
data collection
PROGRAMMED EDIT CHECKS
FIELD VALIDITY LIMIT
CHECKS CHECK CHECK
TOTALS AND
selected fields for an entire
batch of transactions.
RECONCILIATIONS
3 CONTROL TOTALS AND RECONCILIATIONS
RECORD COUNTS
Record count: 3
Batch total: 40,000
Record count: 3 Hash total: 426
Hash total: 11,847
PROCESSING
prevent, detect, and/or correct
errors while data processing
(batch or online) takes place.
PROCESSING
no errors.
To ensure data accuracy and
completeness
OUTPUT
safekeeping of output
reports to ascertain that
security and confidentiality of
OUTPUT proprietary.
organization
Therefore,
must
an
maintain
CONTROLS
procedures to protect output
from unauthorized access, in
the form of written guidelines
and procedures for output
distribution. In the case of
sensitive data, the procedures
might include a requirement
that users sign off on the
receipt of outputs.
TH ANK
YOU