Chapter 7,8,10 As system complexity and our dependence on them increase, companies face the growing risk of their systems being compromised. What are the threats a company faces? Or what are the threats to ais?


key security controls. How you could effectively manage this task (236)



Download 0.52 Mb.
View original pdf
Page7/11
Date17.12.2020
Size0.52 Mb.
#55473
1   2   3   4   5   6   7   8   9   10   11
Chapter 7,8,10
key security controls. How you could effectively manage this task (236)
11. What are the basic categories commonly used in classifying documentation Explain.
Documentation maybe classified into three basic categories
Administrative documentation Describes the standards and procedures for data processing.
Systems documentation Describes each application system and its key processing functions.
Operating documentation: Describes what is needed to run a program.
12. What is disaster recovery plan Why it is necessary to maintain
Disaster Recovery Plan

Minimize the extent of disruption, damage, and loss

Temporarily establish an alternative means of processing information

Resume normal operations as soon as possible

Train and familiarize personnel with emergency operations

Priorities for the recovery process

Insurance

Backup data and program files o Electronic vaulting o Grandfather-father-son concept o Rollback procedures

Specific assignments

Backup computer and telecommunication facilities

Periodic testing and revision

Complete documentation
13. Point out Institute of Internal Auditors five audit scope standards outlining the Internal

Download 0.52 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   10   11




The database is protected by copyright ©ininet.org 2024
send message

    Main page