Database Reference
In-Depth Information
Item
No.
Description
Available Conigured Upgraded Third
Party
Absent
11.
Does the system provide audit trails for varied activities such as security breaches,
user log-ins, proile log-ins, group log-ins, and report format modiications and
generation?
12.
Does the system provide capabilities to maintain audit trails for varied activities like
database structure modiications, data ield modiications, database entry, and
query generation.
13.
Does the system provide safeguards such as passwords or authorized terminals to
protect the tables from unauthorized access?
14.
Does the system provide for varied access rights for activities related to systems
coniguration, systems administration, systems development, MIS activities, Data
Field modiications, Files/Database viewing, Files/database editing, Report Format
Modiications, Report Generation, Printing, Viewing Screens, etc.?
15.
Does the system ensure that the processed data do not include unauthorized
alterations?
16.
Does the system have controls to ensure that all the errors detected by the system
get corrected?
17.
Do the transmitted messages include suficient identiication including the
message number, terminal, date, and transaction type?
18.
Does the system maintain logs to ensure that lost or garbled messages can be
recreated?
19.
Does the system retain information to permit the reconstruction of transactions to
prove the accuracy and completeness of the processing?
 
Search WWH ::




Custom Search