CONCEPT MAP - Operating System PDF
CONCEPT MAP - Operating System PDF
PROCEDURE
INTRA-USER: INTRA-USER:
APPLICATIONS ACCESS
DISCRETIONARY
ACCESS
ACCESS
PRIVILEGE
TOKEN ITSELF USERS
ENVIRONMENT
ACCESS CONTROL
RISK
Controlling Access
Privileges Password Control Malicious and
System Audit Trail
Destructive Programs
Verify that access Ensure that the
privileges are granted Verify effective Ensure that
organization has an management
in a manner that is adequate and effective established
consistent with the policies in place for systems audit
password policy for prevention of
need to separate controlling access to trail is adequate
incompatible functions malicious and for prevention.
the operating system. defective programs.
and is accordance with
company policy.
VERIFICATION INTERVIEWS VERIFICATION
REVEWS VERIFICATION SCANNING
REVIEWS ASSESSMENT SAMPLING