掃碼下載APP
及時接收考試資訊及
備考信息
Integrity controls include data integrity and systems integrity.
1. Input controls
Input controls should ensure accuracy, completeness and validity of input. There are two terms should be noted, one is data verification, which involves ensuring data entered matches source documents; the other one is data validation, it involves ensuring the data entered completely and reasonable. There are various types of checks can be used:
(1)Control totals
(2)Hash totals
(3)Range check
(4)Limit checks
(5)Check digits
2. Processing controls
Processing controls should ensure the accuracy and completeness of processing. Programs should be subject to development controls and to rigorous testing.
3. Output controls
Output controls should ensure the accuracy, completeness and security of output, the measures include investigation and follow-up of exception reports, controls over distribution or copying of output and so forth.
4. Back-up controls
It aims to maintain system and data integrity, and is part of the day-to-day procedures of all computerized systems. A back-up copy of a file is a duplicate copy kept separately from the main system and only used if the original fails.
5. Passwords and logical access systems
A logical access system can prevent access to data and program files by measures such as identification of the users, authentication of user identity and checks on user authority; Passwords are also used by administrators to control access rights for the reading, modifying and deleting functions.
Copyright © 2000 - m.jnjuyue.cn All Rights Reserved. 北京正保會計科技有限公司 版權所有
京B2-20200959 京ICP備20012371號-7 出版物經(jīng)營許可證 京公網(wǎng)安備 11010802044457號