You are on page 1of 3

MANAGEMENT CONTROL SYSTEM

TOPIC- CONTROLLING SECTORIAL


APPLICATION

SECTOR
Sectors are used by economists to classify economic activity
by grouping companies that are engaged in similar business
activity by grouping companies that are engaged in similar
business activities. Some sectors are engaged in activities
that involve the earliest stage of the production cycle , such
as extracting raw materials. Other sector involve the
manufacturing of goods using those raw materials. Sectors
are broken out into four main categories.
Primary sector-primary sector companies are typically
engaged in economic activity that utilizes the earth’s natural
resources
Secondary sector- secondary sector consist of processing,
manufacturing and construction companies.

Tertiary sector-tertiary sector provides service to


businesses and consumers by selling the goods that are
manufactures by companies in the secondary sector
Quaternary sector-quaternary sector use information
and technology to innovate and improve processes and
services, leading to enhancements in economic development

CONTROLLING SECTORIAL APPLICATION


Application control is a security practice that blocks or
restricts unauthorized applications from executing in a ways
that put data at risk. The control functions vary based on the
business purposes of the application, but the main objective
is to ensure the privacy and security of data used and
transmitted.

Completeness checks- ensure records processing from


initiation to completion
Validity checks-ensure only valid data is input or
processed
Identification- ensure unique, irrefutable identification of
all users
Authentication-ensure unique, irrefutable identification of
all users
Authorization-ensure access to the application system by
approved business users only
Input controls-ensure data integrity feeds into the
application system from upstream sources
Forensic controls-ensure scientifically and
mathematically correct data, based on inputs and outputs

FEATURES AND BENEFITS OF APPLICATION


CONTROL
 Automatically identify trusted software that
has authorization
 Prevent all unauthorized applications from
executing
 Eliminate unwanted application to reduce IT
complexity and risk
 Improve our overall network stability
 Identify all application running within the
endpoint environment
 Protect against exploits of unpatched OS and
third party application vulnerabilities

You might also like