Chapter 7,8,10 As system complexity and our dependence on them increase, companies face the growing risk of their systems being compromised. What are the threats a company faces? Or what are the threats to ais?



Download 0.52 Mb.
View original pdf
Page9/11
Date17.12.2020
Size0.52 Mb.
#55473
1   2   3   4   5   6   7   8   9   10   11
Chapter 7,8,10
that protect the system Explain.
The purpose of an information systems audit is to review and evaluate the internal controls that protect the system. When performing an information systems audit, auditors should ascertain that the following six objectives are meta) Security provisions protect computer equipment, programs, communications, and data from unauthorized access, modification, or destruction. b) Program development and acquisition are performed in accordance with management’s general and specific authorization. c) Program modifications have management’s authorization and approval. d) Processing of transactions, files, reports, and other computer records is accurate and complete. e) Source data that are inaccurate or improperly authorized are identified and handled according to prescribed managerial policies. f) Computer data files are accurate, complete, and confidential.

Download 0.52 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   10   11




The database is protected by copyright ©ininet.org 2024
send message

    Main page