- computer-system audit
- Техника: проверка вычислительной системы
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Computer-aided audit tools — Computer assisted audit techniques or computer aided audit tools (CAATS), also known as computer assisted audit tools and techniques (CAATTs), is a growing field within the financial audit profession. CAATTs is the practice of using computers to… … Wikipedia
Computer Aided Audit Tools — Computer Assisted Audit Techniques or Computer Aided Audit Tools (CAATS), also known as Computer Assisted Audit Tools and Techniques (CAATTs), is a growing field within the Financial audit profession. CAATTs is the practice of using computers to… … Wikipedia
Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… … Wikipedia
Computer fraud — is the use of information technology to commit fraud. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which provides for jail time and fines. Contents 1 Notable incidents 2 See also 3 External… … Wikipedia
Audit (disambiguation) — Audit may refer to:*Audit an evaluation of an organization, system, process, project or product * Auditor of a Student Society, especially in Ireland, having a similar etymology. *Academic audit the completion of a course of study for which no… … Wikipedia
audit software — Computer programs used by an auditor to examine an enterprise s computer files. Utility programs may be used, for example, for sorting and printing data files. Package or tailor made programs may be used to interrogate the computer based… … Accounting dictionary
audit software — Computer programs used by an auditor to examine an enterprise s computer files. Utility programs may be used, for example, for sorting and printing data files. Package or tailor made programs may be used to interrogate the computer based… … Big dictionary of business and management
Computer fraud case studies — BackgroundThe purpose of this page is to explore case studies in using Information Technology to commit fraud. Computer fraud is the act of using a computer to commit fraud (A deception deliberately practiced in order to secure unfair or unlawful … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
Computer Fraud and Abuse Act — The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1986, intended to reduce cracking of computer systems and to address federal computer related offenses. The Act (codified as 18 U.S.C. § 1030) governs… … Wikipedia