Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

whts the differents between SoX ,SoD??????wht kind of work
Sox do as wel .....SoD do?
whts is virsa??????? and VRAT,,,,VFAT,, how it workin
security.

Answer Posted / ranjeet kumar

Segaration of duty, as a security principle, has as its
primary objective the prevention of fraud and errors. This
objective is achieved by disseminating the tasks and
associated privileges for a specific business process among
multiple users. This principle is demonstrated in the
traditional example of separation of duty found in the
requirement of two signatures on a cheque.With the concept
of SoD, business critical duties can be categorized into
four types of functions: authorization, custody, record
keeping, and reconciliation.

Is This Answer Correct ?    3 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are su25 t-codes used for?

1256


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

3202


what is the difference between usobt_c and usobx_c?

1366


What does user compare do?

1213


what is sod in sap security?

1241


What does the account assessment category specify in a purchasing requisition in SAP Materials Management?

1380


User is not there in User master record. Then how to trace the user?

1479


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2457


A person has different user ids in different systems and you want to manage their authorizations centrally. Is it possible? How would you do it?

1198


What does the profile generator do?

1136


Which t-code can be used to delete old security audit logs?

1497


List the various user types.

1072


What is audit information system?

1145


Can you explain sap system transactions?

1146


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation

3574