Application Controll
Application Controll
APPLICATlON CONTROLS
Q APPLICATION ? otware8
Applicat,o
9. APPLICA UON Co)thol a | ? ’ Viquo to each
a,
4 Abp catioy Conhol d Key leoruts
?
Kisks to ttie ydudi de d Autty
design eperation d
nternal Contos, d inclpendaut
eHte efetiueness iccency Aprictien
fott
qssesemeut Proujda oszrr shecial AHentien-k
Relet ns
& jssue
tsqusaciona
-y Apphcoton Contas,individual
etopictiy
clioeby selatrq , tor a Auditur o
dat) appiction Reuie Aþroach, ifferet t 0ft
cudit GH audit vary 49t
Applicstion
Conols
abalicatey
buines actiwty /functieg Serue by tue
risk que hand le by
qud to See how tuee
to adtress
Used to address tus eribeut Risks.
Accesing Contos'- Used
<4> Accessing
nude
Sequsuce ad dafticatiog
Gcleckiug fr tionRecosd Cout
transac
eTpor trrs
ntegity checka, Contaof aud
Kfeania
check aud
Hash otols ag
buter uer plo
Control
ceckig
excapion qud suspeuse
tetos pectiue bot
acceut Batorti
<3> Butput Cotrot
-fo eusure Huat trqusacti' on Gutput
is Conplete, accurat qud Corretly
ishibutad.
Aso geetk to pdtkct data, po aased
Nodification qd cistibution
jsiojg Conto i t
de- pro
troi siou
ypli calion Secur ty
oes, Qud
Auditss need 4o Understaut te atrs,
Auditable issws phcalo, Stcoprty
made,
changos
data is up. to dote qud accbrat
mtegrrty te Masteriles is Muntojd,
Bhlier amt caast custonesr datail
Shaigdata ’ sbþhone tlo. e ndo)
(Nae, aldres
nfltion Rats, yshem adistration
data (sueh as pass word files qud ar
Con trof perinjssjong
(2) frocong
erors qud tail tomet
-May kead to poceing
bui hes
toansachiond
(3) bsen ce Guctput lontos:
-May kead to tisks o onautho nsed data moditton
(reation Cutomised Manageut
qud bregch dta congideutjlihy.
( Aplicti on Secyntyi
Mecha wsms
may wate t
35o mdiuul userID 2Paxs oerd)
mis hahai Gur batk to t u
ble to trace
/mþossi
dut.
secunty may lea to
- Lack y Apliction enity,
ConsequeyCas itn vonyiy degree d
loss od in(omey
L seria disution
loss d Cred bilit
y Busines mieruption