audit computer system

audit computer system
kontrolny system komputerowy
nadzorczy system komputerowy

English-Polish dictionary for engineers. 2013.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… …   Wikipedia

  • Order Audit Trail System - OATS — An automated computer system owned by the National Association of Security Dealers (NASD) that is used to record information relating to orders, quotes and other related trade information from all equities that are traded on the Nasdaq, including …   Investment dictionary

  • Computer fraud — is the use of information technology to commit fraud. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which provides for jail time and fines. Contents 1 Notable incidents 2 See also 3 External… …   Wikipedia

  • Computer-aided audit tools — Computer assisted audit techniques or computer aided audit tools (CAATS), also known as computer assisted audit tools and techniques (CAATTs), is a growing field within the financial audit profession. CAATTs is the practice of using computers to… …   Wikipedia

  • Computer fraud case studies — BackgroundThe purpose of this page is to explore case studies in using Information Technology to commit fraud. Computer fraud is the act of using a computer to commit fraud (A deception deliberately practiced in order to secure unfair or unlawful …   Wikipedia

  • Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • Computer Fraud and Abuse Act — The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1986, intended to reduce cracking of computer systems and to address federal computer related offenses. The Act (codified as 18 U.S.C. § 1030) governs… …   Wikipedia

  • audit trail — Resolves the validity of an accounting entry by a step by step record by which accounting data can be traced to their source. Bloomberg Financial Dictionary The range of documents, and other evidence including tape recordings, which records all… …   Financial and business terms

  • Computer forensics — Forensic science Physiological sciences …   Wikipedia

  • Audit trail — An audit trail or audit log is a chronological sequence of audit records, each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”