SlideShare una empresa de Scribd logo
1 de 212
HAPTER 7 Information Systems Controls for Systems Reliability Part 1:  Information Security
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],SECURITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY SYSTEMS RELIABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],This is a contract for . . . Encryption Algorithm Xb&j &m 2 ep0%fg . . . Decryption Algorithm This is a contract for . . . Plaintext Plain- text Cipher- text Key + + Key
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS N.W. U S A CA The N.W. employee connects to the government agency’s website and clicks on the button for submitting bids on open contracts.
PREVENTIVE CONTROLS N.W. U S A CA The browser moves to a secure web page displaying the lock icon.
PREVENTIVE CONTROLS N.W. U S A CA ,[object Object],[object Object],[object Object],[object Object],Digital certificate for USA Public key for USA
PREVENTIVE CONTROLS N.W. U S A CA ,[object Object],Digital certificate for N.W. Public key for N.W.
PREVENTIVE CONTROLS N.W. U S A ,[object Object],USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],NW’s Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Hash of NW Bid NW’s Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Digital signature Hash of NW Bid NW’s Bid Coded w/ NW private key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],[object Object],[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],[object Object],[object Object],USA Public N.W. Public Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid A-OK
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object]
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1

Más contenido relacionado

La actualidad más candente

Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Hendri Eka Saputra
 
Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information Systemarif prasetyo
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and ControlAsad Raza
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOXMahesh Patwardhan
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Yasir Khan
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPsJayesh Daga
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologiesSalih Islam
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001Hiran Kanishka
 

La actualidad más candente (20)

Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
Information classification
Information classificationInformation classification
Information classification
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and Control
 
Internal controls in an IT environment
Internal controls in an IT environment Internal controls in an IT environment
Internal controls in an IT environment
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
Isms
IsmsIsms
Isms
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Orientation in IT Audit
Orientation in IT AuditOrientation in IT Audit
Orientation in IT Audit
 
Implementing security
Implementing securityImplementing security
Implementing security
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 

Destacado

6 8-1 sasia information system control for system reliability
6 8-1 sasia information system control for system reliability6 8-1 sasia information system control for system reliability
6 8-1 sasia information system control for system reliabilitydianpipit
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1sharing notes123
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Sia bab 2 Proses Bisnis
Sia bab 2 Proses BisnisSia bab 2 Proses Bisnis
Sia bab 2 Proses BisnisALI MASKUR
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21koolkampus
 
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 editPertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 editLukman Hakim
 
Tinjauan Menyeluruh Atas Sistem Informasi Akuntansi
Tinjauan Menyeluruh Atas Sistem Informasi AkuntansiTinjauan Menyeluruh Atas Sistem Informasi Akuntansi
Tinjauan Menyeluruh Atas Sistem Informasi AkuntansiPutri Yulia R
 
Modul diktat kuliah sia
Modul diktat kuliah siaModul diktat kuliah sia
Modul diktat kuliah siasdcahyo
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Issharing notes123
 
Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01Lukman Hakim
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 

Destacado (16)

6 8-1 sasia information system control for system reliability
6 8-1 sasia information system control for system reliability6 8-1 sasia information system control for system reliability
6 8-1 sasia information system control for system reliability
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
Ch 01
Ch 01Ch 01
Ch 01
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Sia bab 2 Proses Bisnis
Sia bab 2 Proses BisnisSia bab 2 Proses Bisnis
Sia bab 2 Proses Bisnis
 
Ais Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 OverviewAis Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 Overview
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
 
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 editPertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
 
Makalah sia
Makalah siaMakalah sia
Makalah sia
 
Tinjauan Menyeluruh Atas Sistem Informasi Akuntansi
Tinjauan Menyeluruh Atas Sistem Informasi AkuntansiTinjauan Menyeluruh Atas Sistem Informasi Akuntansi
Tinjauan Menyeluruh Atas Sistem Informasi Akuntansi
 
Modul diktat kuliah sia
Modul diktat kuliah siaModul diktat kuliah sia
Modul diktat kuliah sia
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 

Similar a Ais Romney 2006 Slides 07 Is Control1

CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirementshumanus2
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfAbuHanifah59
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptxSuman Garai
 
Achieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdfAchieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdfmicroteklearning21
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Chandan Singh Ghodela
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & complianceVandana Verma
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptxPrashant Singh
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014Accounting_Whitepapers
 
Information security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdfInformation security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdfANSAPPARELS
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.pptKhalilIdhman
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, aMaximaSheffield592
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxhealdkathaleen
 

Similar a Ais Romney 2006 Slides 07 Is Control1 (20)

CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
 
Achieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdfAchieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdf
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
 
Information security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdfInformation security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdf
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.ppt
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
 
Unit 4 standards.ppt
Unit 4 standards.pptUnit 4 standards.ppt
Unit 4 standards.ppt
 

Más de Sharing Slides Training

Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesSharing Slides Training
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentSharing Slides Training
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaSharing Slides Training
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaSharing Slides Training
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaSharing Slides Training
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemSharing Slides Training
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleSharing Slides Training
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleSharing Slides Training
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleSharing Slides Training
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsSharing Slides Training
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 

Más de Sharing Slides Training (12)

Ais Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System DesignAis Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System Design
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In Rea
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An Rea
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The Rea
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting System
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production Cycle
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure Cycle
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue Cycle
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 

Último

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Último (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Ais Romney 2006 Slides 07 Is Control1

  • 1. HAPTER 7 Information Systems Controls for Systems Reliability Part 1: Information Security
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.
  • 152.
  • 153.
  • 154.
  • 155. PREVENTIVE CONTROLS N.W. U S A CA The N.W. employee connects to the government agency’s website and clicks on the button for submitting bids on open contracts.
  • 156. PREVENTIVE CONTROLS N.W. U S A CA The browser moves to a secure web page displaying the lock icon.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163.
  • 164.
  • 165.
  • 166.
  • 167.
  • 168.
  • 169.
  • 170.
  • 171.
  • 172.
  • 173.
  • 174.
  • 175.
  • 176.
  • 177.
  • 178.
  • 179.
  • 180.
  • 181.
  • 182.
  • 183.
  • 184.
  • 185.
  • 186.
  • 187.
  • 188.
  • 189.
  • 190.
  • 191.
  • 192.
  • 193.
  • 194.
  • 195.
  • 196.
  • 197.
  • 198.
  • 199.
  • 200.
  • 201.
  • 202.
  • 203.
  • 204.
  • 205.
  • 206.
  • 207.