Please Login To Continue

Lecture 42 - Application Controls - Boundary Controls

Lesson 42 of 67 • 33 upvotes • 9:43mins

Avatar

Rajat Jain

All the boundary controls have bwen discussed in detail in this particular lesson.

Continue on app
1

Lesson 1 - Concept of Controls (in Hindi)

10:35mins

2

Lesson 2 - Impact of Technology on Controls (in Hindi)

11:34mins

3

Lesson 3 - Impact of Technology on Controls (Part 2) (in Hindi)

11:40mins

4

Lesson 4 - Classification of Controls - Preventive Controls (in Hindi)

12:18mins

5

Lecture 5 - Detective , Corrective and Compensatory Controls (in Hindi)

12:01mins

6

Lecture 6 - Controls based on Nature of IS Resources (in Hindi)

13:31mins

7

Lecture 7 - Controls for Environmental Exposures

11:01mins

8

Lecture 8 - Physical Access Controls - Locks on Doors

8:31mins

9

Lecture 9 - Physical Access Controls - Part 2

8:40mins

10

Lecture 10 - Physical Access Controls - Part 3

11:19mins

11

Lecture 11 - Logical Access Controls - Part 1

10:34mins

12

Lesson 12 Trojans

8:47mins

13

Lecture 13 - Trap Doors and Worms

9:54mins

14

Lecture 14 - Rounding Down and Salami Technique

9:25mins

15

Lecture 15 - What do you mean by the term Synchronous and Asynchronous Transmission?

10:01mins

16

Lecture 16 - Asynchronous Attacks - Data Leakage and Subversive Threats

8:57mins

17

Lecture 17 - Asynchronous Attacks - Wire Tapping and Piggybacking

8:10mins

18

Lecture 18 - Asynchronous Attacks - Shut down of Computer / Denial of Service (DOS) Attack

10:54mins

19

Lecture 19 - Logical Access Controls - Introduction and discussion

11:29mins

20

Lecture 21 - Logical Access Controls - User Responsibilities and Network Access Controls (intro)

10:31mins

21

Lecture 20 - Logical Access Controls - User Access Management

11:43mins

22

Lecture 22 - Network Access Control - Enforced Path

8:53mins

23

Lecture 23 - Firewall

9:37mins

24

Lecture 24 - Encryption

11:08mins

25

Lesson 25 - Call Back Devices and Recording of Transaction Logs

9:13mins

26

Lesson 26 - Operating System Access Controls discussed in brief

10:24mins

27

Lecture 27- Access Token and Access Control List

9:02mins

28

Lecture 28 - Discretionary Access Control

8:58mins

29

Lecture 29 - Application and Monitoring Systems Access Controls (Part 1)

8:23mins

30

Lecture 30 - Application and Monitoring System Access Controls (Part 2)

9:39mins

31

Lecture 31 - Controls Based on Audit Functions

8:35mins

32

Lecture 32 - Types of controls on the basis of Audit Functions Classification

8:47mins

33

Lecture 33 - Managerial Controls - Top Management and Information Systems

10:17mins

34

Lecture 34 - Managerial Controls - Systems Development Management

8:39mins

35

Lecture 35 - Managerial Controls - Programming Management

13:05mins

36

Lecture 36 - Managerial Controls - Data Resource Management (Part 1)

8:58mins

37

Lecture 37 - Managerial Controls - Data Resource Management (Part 2)

10:21mins

38

Lecture 38 - Quality Assurance Management Controls and Security Management Controls

8:39mins

39

Lecture 39 - Operations Management Controls (Part1)

9:02mins

40

Lecture 40 - Operarions Management Controls (Part 2)

9:39mins

41

Lecture 41 - Application controls with an Introductory Conceptual discussion on Boundary Controls

9:54mins

42

Lecture 42 - Application Controls - Boundary Controls

9:43mins

43

Lecture 43 - Application Controls - Input Controls (Part 1)

8:42mins

44

Lecture 44 - Application Controls - Input Controls (Part 2)

8:27mins

45

Lecture 45 - Input Controls (Part 3)

8:17mins

46

Lecture 46 - Input Controls - Data Validation Controls (Contd.)

8:30mins

47

Lecture 47 - Input Controls - Data Validation Controls (Contd.)

8:35mins

48

Lecture 48 - Processing Controls (Part 1)

8:38mins

49

Lecture 49 - Processing Controls (Part 2)

8:26mins

50

Lecture 50 - Processing Controls (Part 3)

8:33mins

51

Lecture 51 - Processing Controls (Part 4)

8:55mins

52

Lecture 52 - Output Controls

8:23mins

53

Lecture 53- Application Controls - Database Controls

8:53mins

54

Lecture 54 - Application Controls - Communication Controls (Part 1)

8:13mins

55

Lecture 55 - Application Controls - Communication Controls (Part 2)

8:08mins

56

Lecture 56 - Application Controls - Communication Controls (Part 3)

8:25mins

57

Lecture 57 - Application Controls - Communication Controls (Part 4)

8:37mins

58

Lecture 58 - Application Controls - Communication Controls (Part 5)

9:00mins

59

Lecture 59 - Application Controls - Communication Controls (Final Part)

8:57mins

60

Lecture 60 - Controls Over data Integrity and Security - Classification of Information

8:53mins

61

Lecture 61 - Data Integrity Concept and Controls

8:40mins

62

Lecture 62 - Data Integrity Policies

9:11mins

63

Lesson 63 - Data Security- Areas to be reviewd by IS Auditor while reviewing Data Security

9:01mins

64

Lecture 64 - Financial Controls

9:06mins

65

Lecture 65 - Personal Computer Controls

8:58mins

66

Lecture 66 - Concept of Cyber Frauds

9:20mins

67

Lecture 67 - Cyber Attacks

10:29mins

Crack CA Foundation with Unacademy

Get subscription and access unlimited live and recorded courses from India's best educators
Structured syllabus
Structured syllabus
Daily live classes
Daily live classes
Ask doubts
Ask doubts
Tests & practice
Tests & practice

More from Rajat Jain

thumbnail
HindiCA Intermediate Group 2

Money Laundering - Concept

Rajat Jain

Similar Plus Courses

Unacademy is India’s largest online learning platform. Download our apps to start learning


Starting your preparation?

Call us and we will answer all your questions about learning on Unacademy

Call +91 8585858585
Company
About usShikshodayaCareersBlogsPrivacy PolicyTerms and Conditions
Products
Learner appLearner appEducator appEducator appParent appParent app