Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

Programme controls entail: a. Manual logs; training of staff; b. firewall; insurance, maintenance; c. User authorisation; data encryption

user-image
Question added by Deleted user
Date Posted: 2015/01/20
imran Noor -
by imran Noor - , Audit Officer , Auditor General of Pakistan

The correct option is (C)

Waqayan Al Waqayan
by Waqayan Al Waqayan , Secretary of Sharia Supervisory Board (SSB) , Ahli United Bank (AUB)

all of them are good controls. however c. is the most relevant and important application control.

Waqas Raza Khan
by Waqas Raza Khan , Accountant , Cold Store Group of Saudi Arabia

Option C

احمد صبحي احمد الصباغ الصباغ
by احمد صبحي احمد الصباغ الصباغ , محاسب عام في قسم الميزانية , شركة الجبر لتجارة السيارات -كيا موتورز

Because data encryption Si easily breached if the encryption software of the type complex either protection system through the entry permit is useful somewhat, but a breakthrough is faster than the encryption system by special methods used by the hacker easy access easily to the site without passing the permit system them to enter or not remains regularity best for the safety and privacy of encryption programs

Khurram Shaukat Memon
by Khurram Shaukat Memon , Academic Research Writer , Freelance Academic Research Writer

I think option (c) is correct answer.

Mir Mujtaba Ali
by Mir Mujtaba Ali , Internal Audit Manager , Confidential

Option C could be the answer - I guess

?

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.