A call-back device requires the dial-in to enter a password and be identified. The system then break the connection to preform user authentication. If the caller is authorized, the call-back device dials the caller’s number to establish a new connection. This restricts access to authorized terminals or telephone numbers an prevents an intruder masquerading as a legitimate user.
Audit Objectives Relating to Subversive Threats
The auditor’s objective is to verify the security and integrity of financial transactions by determining that network control (1) can prevent and detect illegal access both internally and from the Inter, (2) will render useless any data that a perpetrator success-fully captures, and (3) are sufficient to preserve the integrity and physical security of data connected to the network.