Data Communication Control Audit Checklist
Download free Data communication control audit checklist such as:
1. Is a unique hardwired ID code, requiring no human intervention for its use, incorporated into each workstation device (PC, laptop, personal digital assistant [PDA], etc.)?
2. Is this ID code checked and validated by the computer to ensure that no unauthorized workstations are used?
3. Does the communications system avoid the general switchboard to reduce the data transmission error rate and the chance of wiretapping?
4. Are there appropriate controls for voice grade lines to reduce data transmission errors and maintain the integrity of data transmitted?
5. Are data communications lines conditioned for improved accuracy and physical security?
6. Does the system have an automatic store-and-forward capability to maintain control over messages queued for an inoperative or a busy communications device?
7. If leased lines fail, is there an automatic switch over to backup lines?
8. Is a message intercept function used to receive messages directed to inoperable or unauthorized workstations?
9. Does the system use parity checks to detect errors in data transmission?
10. Are validity checks used to compare character signals transmitted with the set of valid characters?
11. Does the system use echo checking to verify each character so that erroneous data is detected?
12. Are forward errors correcting techniques and sophisticated redundancy codes used for detecting and reporting data communications errors?
13. Are techniques available for detecting erroneous retransmissions of data?
14. Are modems equipped with loop back switches for fault isolation?
15. Is there validity checking of hardwired terminal ID codes and transmitted data characters?
16. Are there specially conditioned transmission lines to reduce noise, fading, and amplitude and frequency distortion?
17. Is parity checking done of both individual characters and blocks of characters?
18. Is echo checking done, comparing characters entered with characters received?
19. Are we using wireless technology within our infrastructure? If so, did we implement security to keep our traffic from being intercepted and analyzed?
|Free Download Attachment||Size|