IT General Controls

1234567
Across
  1. 2. Should be unique to each employee and should prohibited from disclosing to others
  2. 4. Computing referring to computer systems that give individuals who are not computer programmers the means to develop computer applications
  3. 6. Access that protects applications and systems
  4. 7. tables The tables that identify all "objects" and "conditions" that the computer has to "know" to be able to control access
Down
  1. 1. Protects an organisation's computer network and data from unauthorised access, such as hackers
  2. 2. Access that protects physical locations
  3. 3. Software developed by the organisation itself
  4. 5. The process of keeping a copy of your master data and/or physical files in a secondary location in case of a disaster