Lesson 1 of 67 • 230 upvotes • 10:35mins
This lesson covers the indepth conceptual discussion of Controls as it provides the first insight on what this chapter is all about. Those who have had problems in the past with this chapter should definitely watch this lecture.
67 lessons • 10h 42m
Lesson 1 - Concept of Controls (in Hindi)
10:35mins
Lesson 2 - Impact of Technology on Controls (in Hindi)
11:34mins
Lesson 3 - Impact of Technology on Controls (Part 2) (in Hindi)
11:40mins
Lesson 4 - Classification of Controls - Preventive Controls (in Hindi)
12:18mins
Lecture 5 - Detective , Corrective and Compensatory Controls (in Hindi)
12:01mins
Lecture 6 - Controls based on Nature of IS Resources (in Hindi)
13:31mins
Lecture 7 - Controls for Environmental Exposures
11:01mins
Lecture 8 - Physical Access Controls - Locks on Doors
8:31mins
Lecture 9 - Physical Access Controls - Part 2
8:40mins
Lecture 10 - Physical Access Controls - Part 3
11:19mins
Lecture 11 - Logical Access Controls - Part 1
10:34mins
Lesson 12 Trojans
8:47mins
Lecture 13 - Trap Doors and Worms
9:54mins
Lecture 14 - Rounding Down and Salami Technique
9:25mins
Lecture 15 - What do you mean by the term Synchronous and Asynchronous Transmission?
10:01mins
Lecture 16 - Asynchronous Attacks - Data Leakage and Subversive Threats
8:57mins
Lecture 17 - Asynchronous Attacks - Wire Tapping and Piggybacking
8:10mins
Lecture 18 - Asynchronous Attacks - Shut down of Computer / Denial of Service (DOS) Attack
10:54mins
Lecture 19 - Logical Access Controls - Introduction and discussion
11:29mins
Lecture 21 - Logical Access Controls - User Responsibilities and Network Access Controls (intro)
10:31mins
Lecture 20 - Logical Access Controls - User Access Management
11:43mins
Lecture 22 - Network Access Control - Enforced Path
8:53mins
Lecture 23 - Firewall
9:37mins
Lecture 24 - Encryption
11:08mins
Lesson 25 - Call Back Devices and Recording of Transaction Logs
9:13mins
Lesson 26 - Operating System Access Controls discussed in brief
10:24mins
Lecture 27- Access Token and Access Control List
9:02mins
Lecture 28 - Discretionary Access Control
8:58mins
Lecture 29 - Application and Monitoring Systems Access Controls (Part 1)
8:23mins
Lecture 30 - Application and Monitoring System Access Controls (Part 2)
9:39mins
Lecture 31 - Controls Based on Audit Functions
8:35mins
Lecture 32 - Types of controls on the basis of Audit Functions Classification
8:47mins
Lecture 33 - Managerial Controls - Top Management and Information Systems
10:17mins
Lecture 34 - Managerial Controls - Systems Development Management
8:39mins
Lecture 35 - Managerial Controls - Programming Management
13:05mins
Lecture 36 - Managerial Controls - Data Resource Management (Part 1)
8:58mins
Lecture 37 - Managerial Controls - Data Resource Management (Part 2)
10:21mins
Lecture 38 - Quality Assurance Management Controls and Security Management Controls
8:39mins
Lecture 39 - Operations Management Controls (Part1)
9:02mins
Lecture 40 - Operarions Management Controls (Part 2)
9:39mins
Lecture 41 - Application controls with an Introductory Conceptual discussion on Boundary Controls
9:54mins
Lecture 42 - Application Controls - Boundary Controls
9:43mins
Lecture 43 - Application Controls - Input Controls (Part 1)
8:42mins
Lecture 44 - Application Controls - Input Controls (Part 2)
8:27mins
Lecture 45 - Input Controls (Part 3)
8:17mins
Lecture 46 - Input Controls - Data Validation Controls (Contd.)
8:30mins
Lecture 47 - Input Controls - Data Validation Controls (Contd.)
8:35mins
Lecture 48 - Processing Controls (Part 1)
8:38mins
Lecture 49 - Processing Controls (Part 2)
8:26mins
Lecture 50 - Processing Controls (Part 3)
8:33mins
Lecture 51 - Processing Controls (Part 4)
8:55mins
Lecture 52 - Output Controls
8:23mins
Lecture 53- Application Controls - Database Controls
8:53mins
Lecture 54 - Application Controls - Communication Controls (Part 1)
8:13mins
Lecture 55 - Application Controls - Communication Controls (Part 2)
8:08mins
Lecture 56 - Application Controls - Communication Controls (Part 3)
8:25mins
Lecture 57 - Application Controls - Communication Controls (Part 4)
8:37mins
Lecture 58 - Application Controls - Communication Controls (Part 5)
9:00mins
Lecture 59 - Application Controls - Communication Controls (Final Part)
8:57mins
Lecture 60 - Controls Over data Integrity and Security - Classification of Information
8:53mins
Lecture 61 - Data Integrity Concept and Controls
8:40mins
Lecture 62 - Data Integrity Policies
9:11mins
Lesson 63 - Data Security- Areas to be reviewd by IS Auditor while reviewing Data Security
9:01mins
Lecture 64 - Financial Controls
9:06mins
Lecture 65 - Personal Computer Controls
8:58mins
Lecture 66 - Concept of Cyber Frauds
9:20mins
Lecture 67 - Cyber Attacks
10:29mins