[go: up one dir, main page]

0% found this document useful (0 votes)
123 views1 page

CONCEPT MAP - Operating System

1) The document discusses log-on procedures and access control for an intra-user application system. 2) It shows access tokens being used to grant access to users and applications, as well as discretionary access privileges. 3) Key aspects of access control risk addressed are password control, prevention of malicious programs, system audit trails, and verification of access privilege policies and management.

Uploaded by

Jovanie Cadungog
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
123 views1 page

CONCEPT MAP - Operating System

1) The document discusses log-on procedures and access control for an intra-user application system. 2) It shows access tokens being used to grant access to users and applications, as well as discretionary access privileges. 3) Key aspects of access control risk addressed are password control, prevention of malicious programs, system audit trails, and verification of access privilege policies and management.

Uploaded by

Jovanie Cadungog
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

LOG-ON

PROCEDURE

INTRA-USER: INTRA-USER:
APPLICATIONS ACCESS
DISCRETIONARY
ACCESS
ACCESS
PRIVILEGE
TOKEN ITSELF USERS

ENVIRONMENT

ACCESS CONTROL
RISK

Controlling Access
Privileges Password Control Malicious and
System Audit Trail
Destructive Programs
Verify that access Ensure that the
privileges are granted Verify effective Ensure that
organization has an management
in a manner that is adequate and effective established
consistent with the policies in place for systems audit
password policy for prevention of
need to separate controlling access to trail is adequate
incompatible functions malicious and for prevention.
the operating system. defective programs.
and is accordance with
company policy.
VERIFICATION INTERVIEWS VERIFICATION
REVEWS VERIFICATION SCANNING
REVIEWS ASSESSMENT SAMPLING

You might also like