Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
(Chapter 1&2)
Chart of accounts
Example:
100-199 Assets
300-399 Liabilities
Pro: fast
Con: vulnerable
Key Length
Encryption Algorithm
For each activity we have to Identify the major threats and evaluate
the adequacy of various control procedures for dealing with those
threats.
To answer this question also you have to write all the threats
and all their corresponding control.
For example:
Threat Controls
5.Incomplete/Inaccurate 5.1Data entry edit control
Orders
6.Invalidorders 6.1Digital and written
signatures
7.Uncollectiable accounts 7.1Credit limits
8.Stockouts or excess 8.1 training
inventory
9.loss of customers 9.1CRM System