Professional Documents
Culture Documents
IT Controls Part II: Security and Access: Accounting Information Systems, 7e
IT Controls Part II: Security and Access: Accounting Information Systems, 7e
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Objectives for Chapter 16
Be able to identify the principal threats to the
operating system and the control techniques used
to minimize the possibility of actual exposures.
Be familiar with the principal risks associated with
electronic commerce conducted over intranets and
the Internet and understand the control techniques
used to reduce these risks.
Be familiar with the risks to database integrity and
the controls used to mitigate them.
Recognize the unique exposures that arise in
connection with electronic data interchange (EDI)
and understand how these exposures can be
reduced.
Hall, Accounting Information Systems, 7e 2
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Operating Systems
Figure 16-2
Figure 16-1
Include:
unauthorized interception of a
message
gaining unauthorized access to an
organization’s network
a denial-of-service attack from a
remote location
Figure 16-4
Sender Receiver
Step 2: SYN/ACK
Figure 16-5
Figure 16-6
Figure 16-7
Figure 16-8
Figure 16-9
Figure 16-10