SlideShare una empresa de Scribd logo
1 de 212
Descargar para leer sin conexión
HAPTER 7 Information Systems Controls for Systems Reliability Part 1:  Information Security
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],SECURITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY SYSTEMS RELIABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],This is a contract for . . . Encryption Algorithm Xb&j &m 2 ep0%fg . . . Decryption Algorithm This is a contract for . . . Plaintext Plain- text Cipher- text Key + + Key
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS N.W. U S A CA The N.W. employee connects to the government agency’s website and clicks on the button for submitting bids on open contracts.
PREVENTIVE CONTROLS N.W. U S A CA The browser moves to a secure web page displaying the lock icon.
PREVENTIVE CONTROLS N.W. U S A CA ,[object Object],[object Object],[object Object],[object Object],Digital certificate for USA Public key for USA
PREVENTIVE CONTROLS N.W. U S A CA ,[object Object],Digital certificate for N.W. Public key for N.W.
PREVENTIVE CONTROLS N.W. U S A ,[object Object],USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],NW’s Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Hash of NW Bid NW’s Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Digital signature Hash of NW Bid NW’s Bid Coded w/ NW private key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],[object Object],[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],[object Object],[object Object],USA Public N.W. Public Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid A-OK
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object]
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1

Más contenido relacionado

La actualidad más candente

Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Hendri Eka Saputra
 
Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information Systemarif prasetyo
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and ControlAsad Raza
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOXMahesh Patwardhan
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Yasir Khan
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPsJayesh Daga
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologiesSalih Islam
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001Hiran Kanishka
 

La actualidad más candente (20)

Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
Information classification
Information classificationInformation classification
Information classification
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and Control
 
Internal controls in an IT environment
Internal controls in an IT environment Internal controls in an IT environment
Internal controls in an IT environment
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
Isms
IsmsIsms
Isms
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Orientation in IT Audit
Orientation in IT AuditOrientation in IT Audit
Orientation in IT Audit
 
Implementing security
Implementing securityImplementing security
Implementing security
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 

Destacado

6 8-1 sasia information system control for system reliability
6 8-1 sasia information system control for system reliability6 8-1 sasia information system control for system reliability
6 8-1 sasia information system control for system reliabilitydianpipit
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1sharing notes123
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Sia bab 2 Proses Bisnis
Sia bab 2 Proses BisnisSia bab 2 Proses Bisnis
Sia bab 2 Proses BisnisALI MASKUR
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21koolkampus
 
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 editPertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 editLukman Hakim
 
Tinjauan Menyeluruh Atas Sistem Informasi Akuntansi
Tinjauan Menyeluruh Atas Sistem Informasi AkuntansiTinjauan Menyeluruh Atas Sistem Informasi Akuntansi
Tinjauan Menyeluruh Atas Sistem Informasi AkuntansiPutri Yulia R
 
Modul diktat kuliah sia
Modul diktat kuliah siaModul diktat kuliah sia
Modul diktat kuliah siasdcahyo
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Issharing notes123
 
Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01Lukman Hakim
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 

Destacado (16)

6 8-1 sasia information system control for system reliability
6 8-1 sasia information system control for system reliability6 8-1 sasia information system control for system reliability
6 8-1 sasia information system control for system reliability
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
Ch 01
Ch 01Ch 01
Ch 01
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Sia bab 2 Proses Bisnis
Sia bab 2 Proses BisnisSia bab 2 Proses Bisnis
Sia bab 2 Proses Bisnis
 
Ais Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 OverviewAis Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 Overview
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
 
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 editPertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
 
Makalah sia
Makalah siaMakalah sia
Makalah sia
 
Tinjauan Menyeluruh Atas Sistem Informasi Akuntansi
Tinjauan Menyeluruh Atas Sistem Informasi AkuntansiTinjauan Menyeluruh Atas Sistem Informasi Akuntansi
Tinjauan Menyeluruh Atas Sistem Informasi Akuntansi
 
Modul diktat kuliah sia
Modul diktat kuliah siaModul diktat kuliah sia
Modul diktat kuliah sia
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 

Similar a Ais Romney 2006 Slides 07 Is Control1

A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirementshumanus2
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfAbuHanifah59
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptxSuman Garai
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Chandan Singh Ghodela
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & complianceVandana Verma
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptxPrashant Singh
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014Accounting_Whitepapers
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.pptKhalilIdhman
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, aMaximaSheffield592
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Aissharing notes123
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1sharing notes123
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationNetwork Intelligence India
 

Similar a Ais Romney 2006 Slides 07 Is Control1 (20)

A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.ppt
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Unit 4 standards.ppt
Unit 4 standards.pptUnit 4 standards.ppt
Unit 4 standards.ppt
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 

Más de Sharing Slides Training

Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesSharing Slides Training
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentSharing Slides Training
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaSharing Slides Training
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaSharing Slides Training
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaSharing Slides Training
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemSharing Slides Training
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleSharing Slides Training
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleSharing Slides Training
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleSharing Slides Training
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsSharing Slides Training
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 

Más de Sharing Slides Training (12)

Ais Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System DesignAis Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System Design
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In Rea
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An Rea
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The Rea
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting System
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production Cycle
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure Cycle
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue Cycle
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 

Último

How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Dr. Asif Anas
 
Department of Health Compounder Question ‍Solution 2022.pdf
Department of Health Compounder Question ‍Solution 2022.pdfDepartment of Health Compounder Question ‍Solution 2022.pdf
Department of Health Compounder Question ‍Solution 2022.pdfMohonDas
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxvidhisharma994099
 
How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17Celine George
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptxmary850239
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlDr. Bruce A. Johnson
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...M56BOOKSTORE PRODUCT/SERVICE
 

Último (20)

How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
 
Department of Health Compounder Question ‍Solution 2022.pdf
Department of Health Compounder Question ‍Solution 2022.pdfDepartment of Health Compounder Question ‍Solution 2022.pdf
Department of Health Compounder Question ‍Solution 2022.pdf
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
Protein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptxProtein Structure - threading Protein modelling pptx
Protein Structure - threading Protein modelling pptx
 
How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17How to Create a Toggle Button in Odoo 17
How to Create a Toggle Button in Odoo 17
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx3.26.24 Race, the Draft, and the Vietnam War.pptx
3.26.24 Race, the Draft, and the Vietnam War.pptx
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting Bl
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...KARNAADA.pptx  made by -  saransh dwivedi ( SD ) -  SHALAKYA TANTRA - ENT - 4...
KARNAADA.pptx made by - saransh dwivedi ( SD ) - SHALAKYA TANTRA - ENT - 4...
 

Ais Romney 2006 Slides 07 Is Control1

  • 1. HAPTER 7 Information Systems Controls for Systems Reliability Part 1: Information Security
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.
  • 152.
  • 153.
  • 154.
  • 155. PREVENTIVE CONTROLS N.W. U S A CA The N.W. employee connects to the government agency’s website and clicks on the button for submitting bids on open contracts.
  • 156. PREVENTIVE CONTROLS N.W. U S A CA The browser moves to a secure web page displaying the lock icon.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163.
  • 164.
  • 165.
  • 166.
  • 167.
  • 168.
  • 169.
  • 170.
  • 171.
  • 172.
  • 173.
  • 174.
  • 175.
  • 176.
  • 177.
  • 178.
  • 179.
  • 180.
  • 181.
  • 182.
  • 183.
  • 184.
  • 185.
  • 186.
  • 187.
  • 188.
  • 189.
  • 190.
  • 191.
  • 192.
  • 193.
  • 194.
  • 195.
  • 196.
  • 197.
  • 198.
  • 199.
  • 200.
  • 201.
  • 202.
  • 203.
  • 204.
  • 205.
  • 206.
  • 207.