0% found this document useful (0 votes)
55 views

CONCEPT MAP - Operating System PDF

1) The document discusses log-on procedures and access control for an intra-user application system. 2) It shows access tokens being used to control discretionary access privileges for users and applications. 3) The main risks discussed are related to password control, malicious programs, and having an adequate system audit trail for access verification and prevention of unauthorized access.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

CONCEPT MAP - Operating System PDF

1) The document discusses log-on procedures and access control for an intra-user application system. 2) It shows access tokens being used to control discretionary access privileges for users and applications. 3) The main risks discussed are related to password control, malicious programs, and having an adequate system audit trail for access verification and prevention of unauthorized access.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

LOG-ON

PROCEDURE

INTRA-USER: INTRA-USER:
APPLICATIONS ACCESS
DISCRETIONARY
ACCESS
ACCESS
PRIVILEGE
TOKEN ITSELF USERS

ENVIRONMENT

ACCESS CONTROL
RISK

Controlling Access
Privileges Password Control Malicious and
System Audit Trail
Destructive Programs
Verify that access Ensure that the
privileges are granted Verify effective Ensure that
organization has an management
in a manner that is adequate and effective established
consistent with the policies in place for systems audit
password policy for prevention of
need to separate controlling access to trail is adequate
incompatible functions malicious and for prevention.
the operating system. defective programs.
and is accordance with
company policy.
VERIFICATION INTERVIEWS VERIFICATION
REVEWS VERIFICATION SCANNING
REVIEWS ASSESSMENT SAMPLING

You might also like