SlideShare une entreprise Scribd logo
1  sur  70
[object Object],[object Object],[object Object]
Application Controls ,[object Object],[object Object],[object Object],[object Object],[object Object]
Auditor’s Tasks ,[object Object],[object Object],[object Object],[object Object]
Session Agenda ,[object Object],[object Object],[object Object],[object Object]
Input/Origination Controls ,[object Object],[object Object],[object Object]
Input/Origination Controls ,[object Object],[object Object],[object Object]
Validation, Editing, Processing ,[object Object],[object Object],[object Object],[object Object]
Output Controls ,[object Object],[object Object]
Auditing Application Controls ,[object Object],[object Object],[object Object]
Input Authorization ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Authorization ,[object Object],[object Object],[object Object],[object Object],[object Object]
Source Documents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Batch Controls and Balancing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Batch Controls ,[object Object],[object Object],[object Object]
Types of Batch Controls ,[object Object],[object Object],[object Object]
Types of Batch Controls ,[object Object],[object Object],[object Object]
Types of Batch Controls ,[object Object],[object Object]
Batch Balancing ,[object Object],[object Object],[object Object],[object Object]
Input Error Reporting ,[object Object],[object Object],[object Object],[object Object],[object Object]
Input Control Techniques ,[object Object],[object Object],[object Object],[object Object]
Input Control Techniques ,[object Object],[object Object],[object Object],[object Object]
Input Control Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Validation and Editing ,[object Object],[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object]
Data Validation Edits ,[object Object],[object Object],[object Object]
Processing Controls ,[object Object],[object Object],[object Object]
Processing Controls ,[object Object],[object Object]
Processing Controls ,[object Object],[object Object],[object Object]
Processing Controls ,[object Object],[object Object],[object Object],[object Object]
Processing Controls ,[object Object],[object Object],[object Object]
Processing Controls ,[object Object],[object Object],[object Object]
Processing Controls ,[object Object],[object Object],[object Object]
Data File Controls ,[object Object],[object Object],[object Object]
Data File Controls ,[object Object],[object Object],[object Object]
Data File Controls ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data File Controls ,[object Object],[object Object],[object Object],[object Object]
Data File Controls ,[object Object],[object Object],[object Object]
Data File Controls ,[object Object],[object Object],[object Object]
Data File Controls ,[object Object],[object Object],[object Object]
Data File Controls ,[object Object],[object Object],[object Object],[object Object]
Data File Controls ,[object Object],[object Object],[object Object],[object Object]
Data File Controls ,[object Object],[object Object]
Output Controls ,[object Object],[object Object],[object Object]
Output Controls ,[object Object],[object Object],[object Object],[object Object]
Output Controls ,[object Object],[object Object],[object Object],[object Object]
Output Controls ,[object Object],[object Object],[object Object]
Output Controls ,[object Object],[object Object],[object Object]
Output Controls ,[object Object],[object Object],[object Object],[object Object]
Review Documentation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Observation of Users ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Observation of Users ,[object Object],[object Object],[object Object],[object Object]
Observation of Users ,[object Object],[object Object],[object Object]
Observation of Users ,[object Object],[object Object],[object Object],[object Object],[object Object]
Observation of Users ,[object Object],[object Object],[object Object],[object Object]
Observation of Users ,[object Object],[object Object],[object Object],[object Object]
Data Integrity Testing ,[object Object],[object Object],[object Object],[object Object]
Data Integrity Testing ,[object Object],[object Object],[object Object],[object Object]
Data Integrity Testing ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
Sharah Ayumi
 
Chapter 9 introduction to transaction processing
Chapter 9 introduction to transaction processingChapter 9 introduction to transaction processing
Chapter 9 introduction to transaction processing
Jafar Nesargi
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
Rikesh Chaurasia
 

Tendances (19)

The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Chapter 9 introduction to transaction processing
Chapter 9 introduction to transaction processingChapter 9 introduction to transaction processing
Chapter 9 introduction to transaction processing
 
James hall ch 2
James hall ch 2James hall ch 2
James hall ch 2
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
AccSys204. tute 04
AccSys204. tute 04AccSys204. tute 04
AccSys204. tute 04
 
James hall ch 3
James hall ch 3James hall ch 3
James hall ch 3
 
Lecture 20 computer based accounting system -revenue cycle - accounting info...
Lecture 20  computer based accounting system -revenue cycle - accounting info...Lecture 20  computer based accounting system -revenue cycle - accounting info...
Lecture 20 computer based accounting system -revenue cycle - accounting info...
 
James hall ch 1
James hall ch 1James hall ch 1
James hall ch 1
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue Cycle
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
 
James hall ch 6
James hall ch 6James hall ch 6
James hall ch 6
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Chapter 02 - Transaction Processing System
Chapter 02 - Transaction Processing SystemChapter 02 - Transaction Processing System
Chapter 02 - Transaction Processing System
 
Lecture 19 physical and manual system -revenue cycle - accounting informatio...
Lecture 19  physical and manual system -revenue cycle - accounting informatio...Lecture 19  physical and manual system -revenue cycle - accounting informatio...
Lecture 19 physical and manual system -revenue cycle - accounting informatio...
 
Accounts payable
Accounts payableAccounts payable
Accounts payable
 

Similaire à Application Security: By Prashant Mali Cyber law Consultant

03.2 application control
03.2 application control03.2 application control
03.2 application control
Mulyadi Yusuf
 
controlling information system
controlling information systemcontrolling information system
controlling information system
onearbaein
 
Free quality management system software
Free quality management system softwareFree quality management system software
Free quality management system software
selinasimpson361
 
Sushant edp
Sushant edpSushant edp
Sushant edp
zalak007
 
Quality management processes
Quality management processesQuality management processes
Quality management processes
selinasimpson0701
 
transactionprocessingsystem-161006153930.pdf
transactionprocessingsystem-161006153930.pdftransactionprocessingsystem-161006153930.pdf
transactionprocessingsystem-161006153930.pdf
DipakRathod48
 

Similaire à Application Security: By Prashant Mali Cyber law Consultant (20)

hhhh.ppt
hhhh.ppthhhh.ppt
hhhh.ppt
 
Harnessing Advanced Data Validation Techniques in Accounts Payable Automation...
Harnessing Advanced Data Validation Techniques in Accounts Payable Automation...Harnessing Advanced Data Validation Techniques in Accounts Payable Automation...
Harnessing Advanced Data Validation Techniques in Accounts Payable Automation...
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
 
controlling information system
controlling information systemcontrolling information system
controlling information system
 
Free quality management system software
Free quality management system softwareFree quality management system software
Free quality management system software
 
TYASuite Procure to Pay Software ( Procurement Software / E-Procurement Softw...
TYASuite Procure to Pay Software ( Procurement Software / E-Procurement Softw...TYASuite Procure to Pay Software ( Procurement Software / E-Procurement Softw...
TYASuite Procure to Pay Software ( Procurement Software / E-Procurement Softw...
 
IT Revision and Auditing
IT Revision and AuditingIT Revision and Auditing
IT Revision and Auditing
 
Basware Invoice Automation Presentation 2007
Basware Invoice Automation Presentation 2007Basware Invoice Automation Presentation 2007
Basware Invoice Automation Presentation 2007
 
Accounting System Design and Development-Internal Controls
Accounting System Design and Development-Internal ControlsAccounting System Design and Development-Internal Controls
Accounting System Design and Development-Internal Controls
 
ais6e-140422104321-phpapp02.pdf
ais6e-140422104321-phpapp02.pdfais6e-140422104321-phpapp02.pdf
ais6e-140422104321-phpapp02.pdf
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Intelligent Process Automation in Audit
Intelligent Process Automation in AuditIntelligent Process Automation in Audit
Intelligent Process Automation in Audit
 
Quality management processes
Quality management processesQuality management processes
Quality management processes
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Transaction processing systems
Transaction processing systemsTransaction processing systems
Transaction processing systems
 
Oracle R12 SCM Functional Interview Questions - Order Management,
Oracle R12 SCM Functional Interview Questions - Order Management, Oracle R12 SCM Functional Interview Questions - Order Management,
Oracle R12 SCM Functional Interview Questions - Order Management,
 
transactionprocessingsystem-161006153930.pdf
transactionprocessingsystem-161006153930.pdftransactionprocessingsystem-161006153930.pdf
transactionprocessingsystem-161006153930.pdf
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 

Plus de Shivaami Corporation (6)

Always On Business Agility
Always On Business AgilityAlways On Business Agility
Always On Business Agility
 
Bni
BniBni
Bni
 
Boost Immune System, Important tips for Boosting Immune System
Boost Immune System, Important tips for Boosting Immune SystemBoost Immune System, Important tips for Boosting Immune System
Boost Immune System, Important tips for Boosting Immune System
 
Numbers, Why One is One, Two is Two?
Numbers, Why One is One, Two is Two?Numbers, Why One is One, Two is Two?
Numbers, Why One is One, Two is Two?
 
Application Security:
Application Security: Application Security:
Application Security:
 
Shivaami: Website Designing Company
Shivaami: Website Designing CompanyShivaami: Website Designing Company
Shivaami: Website Designing Company
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Application Security: By Prashant Mali Cyber law Consultant

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.